heroui logo

Okta: MFA bypass attempt

Anvilogic Forge

View Source
Summary
This detection rule targets attempts to bypass Multi-Factor Authentication (MFA) within Okta, a widely-used identity management service. Specifically, it monitors for events classified as 'user.mfa.attempt_bypass' within the last two hours, helping organizations identify potentially malicious actors trying to disable or bypass the added layer of security that MFA provides. The rule plays a crucial role in defending against credential compromise, particularly from threat actor groups like LUCR-3 and Scattered Spider, who have been linked to various authentication-related attacks. By aggregating relevant authentication and application log data, the rule facilitates real-time detection of suspicious activities associated with MFA bypass attempts.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1098
  • T1550
Created: 2024-02-09