heroui logo

Auth0: Incorrect Recovery Code

Anvilogic Forge

View Source
Summary
This detection rule focuses on monitoring failed multi-factor authentication (MFA) recovery attempts in Auth0 environments. Threat actors may utilize stolen or guessed recovery codes to circumvent MFA protections, potentially indicating account compromise. The rule operates on log data related to authentication, specifically targeting events where users fail to enter the correct recovery code. The Splunk logic captures these failed attempts by filtering events with the 'gd_recovery_failed' signature, which signifies erroneous recovery code entries. These entries are aggregated and tabulated to present relevant information, such as timestamps, host identifiers, user details, and geographical data. By analyzing these statistics, security teams can identify patterns indicative of malicious activity or user errors, allowing for timely interventions to prevent unauthorized access to accounts.
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.001
  • T1110.003
  • T1110.004
Created: 2025-02-28