heroui logo

Multiple Okta Users With Invalid Credentials From The Same IP

Splunk Security Content

View Source
Summary
This detection rule identifies suspicious activity by monitoring multiple failed login attempts to Okta user accounts originating from a single IP address within a short timeframe. The rule works by analyzing Okta logs, specifically searching for events classified as user session failures, where the outcome indicates a failure result. The analytics filter out the event data to determine distinct user accounts that have failed to log in from the same IP address, utilizing a threshold of five distinct users to flag potential attacks. Although targeted at detecting brute force attacks or credential stuffing attempts, care must be taken as legitimate users sharing a public IP may generate false positives. Adjustments to the thresholds can be made via the provided filter macro to improve precision of detection without compromising security.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.003
  • T1078
  • T1078.001
Created: 2024-11-14