
Summary
The Malicious SSO DNS Lookup rule is designed to detect potentially malicious DNS requests targeting Single Sign-On (SSO) domains. This rule leverages various log types, including Cisco Umbrella DNS, Crowdstrike DNS Requests, Suricata DNS, and Zeek DNS to identify suspicious activities. It specifically looks for DNS queries directed at domains that mimic known SSO domains in an attempt to compromise user credentials. The rule is currently disabled and has a threshold of 1000 potential matches per day, indicating it is intended for high-traffic environments where such queries may be frequent.
Categories
- Network
- Endpoint
- Cloud
- Web
- Application
Data Sources
- Pod
- Container
- User Account
- Network Traffic
- Application Log
ATT&CK Techniques
- T1566
Created: 2022-09-12