heroui logo

Okta Mismatch Between Source and Response for Verify Push Request

Splunk Security Content

View Source
Summary
This detection rule identifies suspicious behavior in Okta Verify Push requests by analyzing discrepancies between source and response events. It utilizes Okta System Log events related to the push verification process, specifically looking at `system.push.send_factor_verify_push` events and corresponding authentication events where the factor is "OKTA_VERIFY_PUSH." By grouping events based on SessionID, the rule calculates the success ratio for sign-ins versus push requests, while monitoring for session roaming, new devices, and new IP addresses. Unusual activity, such as push spam or unauthorized access attempts, is flagged if the success-to-push request ratio is lower than 0.5 and multiple suspicious devices or IPs are detected. This validation is critical as it may indicate potential bypass of multi-factor authentication (MFA), posing risks to sensitive systems.
Categories
  • Cloud
  • Identity Management
  • Other
Data Sources
  • Pod
  • User Account
  • Application Log
  • Service
ATT&CK Techniques
  • T1621
Created: 2025-01-21