
Summary
This detection rule monitors failed email verification attempts within the Auth0 authentication framework. It targets events where users attempt to verify their email but encounter failures, which may be due to various reasons like incorrect verification codes, expired links, or security measures that hinder authentication. The rule aims to identify potential malicious activities such as attackers testing stolen credentials to gain access to accounts or trying to exploit the account recovery process. When a match occurs, it captures relevant details including the time of the event, host, user, signature, and geographical information. This helps in identifying potential threats targeting the email verification system, which is a critical component of multi-factor authentication workflows.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1078
Created: 2025-02-28