heroui logo

GSuite User Password Leaked

Panther Rules

View Source
Summary
The GSuite User Password Leaked detection rule monitors for incidents where a user's password is reported to have been compromised. This rule is crucial as it enables organizations to take immediate action when a user's login credentials are potentially exposed. When GSuite identifies a compromised password, it triggers a disabling event for that user's account, thereby preventing unauthorized access. The detection logic specifically looks for account warning events related to password leaks, marking them as critical alerts to be addressed promptly. The rule functions by analyzing GSuite ActivityEvent logs for specific conditions indicative of password leaks and accounts being disabled due to such leaks. A comprehensive response plan is suggested that includes investigating the incident, resetting the user's passwords, and advising users to change any passwords that may have been similarly exposed.
Categories
  • Cloud
  • Web
  • Application
  • Identity Management
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1552
Created: 2022-09-02