heroui logo

Multiple Failed Network Logon Attempts from Host

Anvilogic Forge

View Source
Summary
The detection rule identifies potential password spraying attacks by analyzing failed network logon attempts originating from a single host across multiple user accounts within a two-minute window. This is indicated by monitoring Event ID 4625, which logs failed login attempts in Windows. If a certain threshold of unique accounts attempting to authenticate fails (defaulting to exceeding 10 unique accounts), it flags the event as anomalous. The rule also evaluates the average and standard deviation of failed attempts to filter out normal activity, thereby concentrating on outlier scenarios indicative of brute force tactics such as credential-access techniques. By leveraging the query logic with Splunk, the rule processes logs to pinpoint these suspicious events effectively, serving as a proactive measure against unauthorized access attempts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.003
Created: 2024-10-25