Potential brute force attack detected

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a user fails to log in to Abnormal Security an unusually high number of times.

Strategy

This rule monitors for failed user logins, which may indicate that an attacker has gained access to the user credentials and accessed the account.

Triage and response

  1. Investigate the other actions performed by the user {{@user.email}}.
  2. If confirmed as a threat, implement measures to block or limit the impact of the suspicious activity.
  3. Follow company procedures for handling malicious files, including isolating the endpoint, running antivirus/antimalware scans, analyzing logs, and updating security policies.