
Summary
The detection rule is focused on identifying failed login attempts in the Auth0 system that are attributed to incorrect passwords. These attempts may be the result of user error or malicious activities like password guessing, credential stuffing, or brute-force attacks by threat actors trying to gain unauthorized access to accounts. The rule leverages the `get_authentication_data_auth0` function in Splunk to capture events labeled as 'fp' (failed password attempts) and subsequently filters these events to generate a summary table displaying pertinent details such as the time of the attempt, host, user, and geographical location. While this rule flags potentially suspicious activity, it also acknowledges that not every failed login attempt is malicious. Hence, it is crucial to analyze the context of these failed attempts for a comprehensive security posture.
Categories
- Cloud
- Identity Management
- Web
Data Sources
- User Account
- Application Log
- Logon Session
ATT&CK Techniques
- T1110
- T1110.001
- T1110.003
- T1110.004
Created: 2025-02-28