Brute force attempt from suspicious IP by user email

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect a brute force attack on a user across log sources.

Strategy

To identify a successful attempt: Detect when the same user fails to log in five times, and then successfully logs in. This generates a MEDIUM severity signal.

To identify an unsuccessful attempt: Detect when the same user fails to log in ten times. This generates an INFO severity signal.

Triage and response

  1. Inspect the logs to see if this was a valid login attempt.
  2. Verify if 2FA was authenticated.
  3. If the user was compromised, rotate user credentials.
PREVIEWING: brett.blue/embedded-collector-release