heroui logo

Auth0: Device Rejected by User

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify instances where a user fails to confirm the enrollment of a Multi-Factor Authentication (MFA) device in the Auth0 platform. When a threat actor attempts to gain unauthorized access, they may try to register a new device for MFA but will be unable to complete the confirmation due to the legitimate user's security controls or lack of access to the user's approval method. This behavior is critical to detect, as it suggests that an unauthorized actor is attempting to manipulate account access by registering undesired MFA devices. The rule utilizes Splunk query logic to analyze authentication logs for events where the user 'did not confirm device' and flags them accordingly for further investigation.
Categories
  • Identity Management
  • Endpoint
Data Sources
  • User Account
  • Application Log
  • Web Credential
ATT&CK Techniques
  • T1098.005
Created: 2025-02-28