
Summary
The detection rule titled "Okta Successful Login After Credential Attack" is designed to identify potential account compromises by correlating credential attack alerts from Okta with subsequent successful logins by the same user. The rule specifically targets scenarios involving brute force, password spraying, or credential stuffing attacks. By analyzing alerts from at least one of five previously defined credential attack detection rules, and matching them against successful authentication events, the rule aims to uncover instances where attackers may have successfully gained unauthorized access to user accounts after launching credential-based attacks. This correlation is crucial in identifying instances of compromised credentials, particularly in environments where attackers might rotate IP addresses after a successful breach. The investigation process suggested by the rule includes steps such as assessing user timelines, comparing source IPs, and reviewing user activity post-login to detect signs of account takeover. The rule also anticipates false positives related to legitimate user login attempts and automated password resets, which may trigger attack alerts mistakenly. The analysis emphasizes the importance of quick response actions, such as resetting passwords and revoking sessions, should a compromise be suspected.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Web Credential
- Application Log
- Cloud Service
ATT&CK Techniques
- T1110
- T1110.001
- T1110.003
- T1110.004
- T1078
- T1078.004
Created: 2026-02-12