
Summary
This detection rule is designed to identify instances where threat actors may manipulate user accounts through the Auth0 Management API. By monitoring for specific API calls, this rule captures unauthorized creation of user accounts, which may be indicative of privilege escalation or persistence tactics by an attacker. The logic utilizes Splunk to filter events indicating user creation and aggregates relevant fields such as timestamps, host information, and geographical location to present a comprehensive view of the activity. This monitoring is vital for flagging suspicious behavior early to allow for swift incident response.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Web Credential
ATT&CK Techniques
- T1136
Created: 2025-02-28