
Summary
This detection rule is designed to identify potentially malicious activities related to Okta user authentication by monitoring for a high number of failed login attempts originating from a single IP address. The rule applies a threshold of 25 failed authentication events from the same IP, which may indicate either a brute force attack or a password spraying attack aimed at gaining unauthorized access to user accounts. Enhanced investigation steps are outlined to analyze the source of these attempts, including examining the event outcomes, user accounts targeted, and the historical data of the IP's login history. False positives can arise from automated processes or legitimate users making multiple failed login attempts, necessitating a careful review before taking action. Remediation steps include blocking the suspicious IP, notifying affected users, and strengthening security measures such as implementing multi-factor authentication (MFA). The effectiveness of this rule relies on the use of appropriate log sources, specifically Okta integration via Filebeat, and is aligned with the MITRE ATT&CK framework under the credential access tactic.
Categories
- Identity Management
Data Sources
- User Account
- Cloud Service
- Web Credential
ATT&CK Techniques
- T1110
Created: 2020-07-16