heroui logo

Auditd Max Failed Login Attempts

Elastic Detection Rules

View Source
Summary
The rule 'Auditd Max Failed Login Attempts' is designed to detect the maximum number of failed login attempts for a user, indicating potential unauthorized access attempts. The rule utilizes the Elastic Stack's auditd data source, which captures logs related to user authentication. The detection is based on querying the auditd logs for a specific event indicating that a user has failed to log in multiple times. Upon achieving a set threshold of failed attempts, the rule triggers an alert, signaling potential brute-force attacks or credential stuffing tactics employed by attackers to gain access to valid accounts. It attributes a risk score of 47, indicating a medium level of threat concern, primarily categorized under the initial access and persistence tactics of the MITRE ATT&CK framework. The rule primarily targets Linux systems and is an essential part of monitoring for security incidents related to credential misuse.
Categories
  • Linux
  • Endpoint
  • Infrastructure
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Process
ATT&CK Techniques
  • T1078
Created: 2020-07-08