Credential Stuffing Attack on Azure
Set up the azure integration.
Goal
Detect and identify the network IP address or user agent when multiple user accounts have login attempt activities recorded.
Strategy
Monitor Azure Active Directory and detect when any @evt.category
is equal to SignInLogs
and at least 5 of the @evt.outcome
are equal to false
by the same network IP address or user agent.
Security Signal returns MEDIUM if`@evt.outcomehas value of
success` after 5 multiple failed logins by the same network IP address or user agent.
Triage and response
- Inspect the log and determine if this was a valid login attempt.
- If the user was compromised, rotate user credentials.
Changelog
- 14 June 2022 - Updated triggering cases to align with other credential stuffing rules. Also updated other backend options to reduce noise levels.
- 26 October 2022 - Updated query.