heroui logo

Auth0: User block released from anomaly detection

Anvilogic Forge

View Source
Summary
This rule is designed to monitor and detect the anomalous release of user blocks in Auth0's authentication environment. It focuses on events indicating that a user previously blocked due to anomaly detection has had their block lifted. The critical strings monitored are 'ublkdu' and 'User block setup by anomaly detection has been released.' By capturing these events, the rule assesses whether a legitimate user is regaining access or if an unauthorized user could be circumventing security measures. The detection logic utilizes Splunk's capabilities to query authentication data, filtering for relevant event types and compiling statistics on user sessions, actions, and source IP addresses. This rule covers different attack techniques, including valid account usage for persistence, privilege escalation, defense evasion, and initial access, which are important areas of focus for security monitoring. The identification of such events plays a key role in strengthening the overall security posture by assisting security analysts in detecting potentially malicious activities.
Categories
  • Identity Management
  • Cloud
  • Web
  • Application
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2025-02-28