heroui logo

Azure AD Device Code Authentication

Splunk Security Content

View Source
Summary
The Azure AD Device Code Authentication analytic is designed to detect phishing attacks targeting the device code authentication protocol. By monitoring Azure Active Directory's SignInLogs, it identifies suspicious authentication attempts that may suggest a bypass of Multi-Factor Authentication (MFA) and Conditional Access Policies (CAPs). This analytic is crucial because successful phishing can lead to account take-overs, enabling unauthorized access to Azure services like Exchange mailboxes and Outlook Web Applications. The detection employs a structured search query to aggregate login events that match specified criteria, tracking their frequency and timestamps to identify unusual patterns in user activity that may signal malicious intent. As organizations rely more on cloud services, this rule provides essential protection against prevalent phishing tactics aimed at Azure environments.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Active Directory
ATT&CK Techniques
  • T1528
  • T1566
  • T1566.002
Created: 2024-11-14