
Summary
This detection rule is designed to identify unauthorized modifications to Multi-Factor Authentication (MFA) device settings in the Auth0 identity management platform. Threat actors often seek to replace legitimate users' authentication methods with their own, ensuring ongoing access to compromised accounts. The rule captures events related to the updating of MFA devices, specifically looking for log entries where the event type is indicated as 'gd_update_device_account' or when an MFA device used for second-factor authentication has been updated. The detection logic is implemented in Splunk and organizes relevant event data, such as timestamps, host information, user identity, geographical locations, source IP addresses, and the user who made the changes. By monitoring these updates, defenders can swiftly identify potential account compromises and take necessary actions to secure affected accounts.
Categories
- Identity Management
- Cloud
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1556.006
Created: 2025-02-28