
Summary
This detection rule is designed to identify failed login attempts in the Auth0 authentication system, which may indicate potential malicious activity such as credential stuffing, brute-force attacks, or configuration errors. The specified logic retrieves authentication events from Auth0, specifically looking for events labeled as failed logins or failed cross-origin authentications. It leverages the `get_authentication_data_auth0` function, using a filtering condition to assess the event types matched against regex patterns that signify failures. The output includes key details such as timestamps, the host involved, user accounts, geographical information, and source IP addresses, facilitating a comprehensive analysis of the failure incidents over time. By monitoring these events, security teams can better understand login trends and detect potential threats early in the lifecycle of an attack. The logic is executed against security logs collected from the Auth0 platform, emphasizing the importance of timely detection and response to unauthorized access attempts.
Categories
- Identity Management
- Web
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1110
Created: 2025-02-28