Credential Stuffing Attack on Azure

Set up the azure integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect and identify the network IP address or user agent when multiple user accounts have login attempt activities recorded.

Strategy

Monitor Azure Active Directory and detect when any @evt.category is equal to SignInLogs and at least 5 of the @evt.outcome are equal to false by the same network IP address or user agent.

Security Signal returns MEDIUM if`@evt.outcomehas value ofsuccess` after 5 multiple failed logins by the same network IP address or user agent.

Triage and response

  1. Inspect the log and determine if this was a valid login attempt.
  2. If the user was compromised, rotate user credentials.

Changelog

  • 14 June 2022 - Updated triggering cases to align with other credential stuffing rules. Also updated other backend options to reduce noise levels.
  • 26 October 2022 - Updated query.
PREVIEWING: rtrieu/product-analytics-ui-changes