Potential brute force attack detected

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when a user fails to log in to Abnormal Security an unusually high number of times.

Strategy

This rule monitors for failed user logins, which may indicate that an attacker has gained access to the user credentials and accessed the account.

Triage and response

  1. Investigate the other actions performed by the user {{@user.email}}.
  2. If confirmed as a threat, implement measures to block or limit the impact of the suspicious activity.
  3. Follow company procedures for handling malicious files, including isolating the endpoint, running antivirus/antimalware scans, analyzing logs, and updating security policies.