
Summary
This detection rule focuses on identifying suspicious behavior related to multi-factor authentication (MFA) requests, specifically under Okta's framework. It captures events where there may be discrepancies between the source of a push notification and the response received, leveraging real-time statistics from authentication logs. The rule combines multiple event types, using fields such as session ID, action, and source IP to compute relevant metrics. Key indicators include the number of successful and failed push requests, while also inspecting for new device and IP addresses flagged in the event details. The overall logic culminates in filtering for rates of success and failure that prompt further investigation when unusual patterns are detected, effectively targeting potential credential abuse techniques.
Categories
- Identity Management
- Cloud
- Application
- Endpoint
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1621
Created: 2024-02-09