Credential Stuffing Attack on Azure
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect and identify the network IP address or user agent when multiple user accounts have login attempt activities recorded.
Strategy
Monitor Azure Active Directory and detect when any @evt.category
is equal to SignInLogs
and at least 5 of the @evt.outcome
are equal to false
by the same network IP address or user agent.
Security Signal returns MEDIUM if`@evt.outcomehas value of
success` after 5 multiple failed logins by the same network IP address or user agent.
Triage and response
- Inspect the log and determine if this was a valid login attempt.
- If the user was compromised, rotate user credentials.
Changelog
- 14 June 2022 - Updated triggering cases to align with other credential stuffing rules. Also updated other backend options to reduce noise levels.
- 26 October 2022 - Updated query.