Asana brute force attempt

This rule is part of a beta feature. To learn more, contact Support.

Set up the asana integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Identify cases where there is a high number of failed login attempts followed by a successful login. This behavior can indicate a brute-force attack or an unauthorized access attempt.

Strategy

This rule monitors failed login attempts followed by a successful login, raising an alert if the count surpasses the threshold.

Triage and response

  1. Review logs to identify the account {{@usr.email}} associated with the failed login attempts.
  2. Examine the IP addresses and locations ({{@network.client.ip}}, {{@network.client.geoip.city.name}}, {{@network.client.geoip.country.name}}) associated with the failed attempts to identify any unusual access patterns.
  3. Determine if the login attempts are clustered within a short period or if they follow a gradual pattern, as this can help distinguish between brute-force and accidental lockouts.
  4. Investigate if there are any ongoing system issues or maintenance activities that could account for increased login failures.
  5. If suspicious behavior is detected, consider locking the affected accounts, notifying users, and requiring additional authentication steps.