
Summary
The detection rule titled 'Auth0: Second Factor Authentication Started' focuses on identifying scenarios where the second factor of multi-factor authentication (MFA) is initiated. This is crucial as attackers might either trigger MFA challenges to simulate user logins (a method often used in account takeover attempts) or to exploit MFA fatigue, where users become desensitized to repeated authentication requests. The rule captures events from the Auth0 authentication system related to the start of an MFA challenge and helps differentiate between legitimate user activities and potential attacker behaviors. It leverages the Splunk query language to filter authentication events, particularly looking for those signaled by 'gd_start_auth' or similar messaging indicating the commencement of an MFA challenge. The output is structured to provide insights based on time, user identity, geographic data (City, Region, Country), and relevant identifiers, making it easier to analyze the context of these authentication attempts.
Categories
- Identity Management
- Web
- Cloud
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1621
Created: 2025-02-28