heroui logo

Crowdstrike User Password Changed

Panther Rules

View Source
Summary
The detection rule 'Crowdstrike User Password Changed' monitors for user password changes within a CrowdStrike environment. It logs events associated with password changes, focusing on success and failure scenarios to identify unauthorized or suspicious password modifications. The rule has a medium severity level and operates based on events from CrowdStrike's Event Streams. It utilizes a deduplication period of one hour to prevent spamming with repeated alerts, triggering when at least one matching event is logged. The rule specifically checks for legitimate password changes by the user and identifies attempts to change passwords for different users or unsuccessful changes, emphasizing the need to validate authorization for such actions. The rule is also linked to specific MITRE ATT&CK tactics and techniques related to credential access and account manipulation, reinforcing its importance in maintaining user account security.
Categories
  • Identity Management
  • Cloud
  • Endpoint
Data Sources
  • User Account
  • Application Log
  • Service
ATT&CK Techniques
  • T1098.001
Created: 2024-07-22