Multiple Logon Failure Followed by Logon Success
This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.
This detection rule focuses on identifying brute-force or password guessing attacks against Windows systems. It detects multiple failed logon attempts originating from the same source IP address, followed by a successful logon. This pattern suggests an attacker attempting to guess credentials to gain unauthorized access to an account. The rule leverages Windows Security Event Logs to monitor authentication events. This activity is important for defenders because successful brute-force attacks can lead to account compromise, data breaches, and further malicious activities within the network. The rule uses EQL and analyzes logs-system.security*, logs-windows.forwarded*, and winlogbeat-* indices.
Attack Chain
- The attacker initiates multiple failed logon attempts to a Windows system using various username and password combinations. These attempts originate from a single source IP address and target network logon types.
- The system records each failed logon attempt as a Windows Security Event Log event (Event ID 4625). The event includes information about the source IP address, target username, and failure reason.
- After several failed attempts, the attacker guesses the correct password for a valid user account.
- The system records a successful logon event (Event ID 4624) for the compromised account, originating from the same source IP address as the previous failed attempts, also via a network logon type.
- The attacker gains initial access to the target system using the compromised account.
- The attacker may then attempt to escalate privileges or move laterally within the network, using the compromised account to access additional resources or systems.
Impact
A successful brute-force attack can lead to unauthorized access to sensitive data, system compromise, and further malicious activities within the network. Compromised accounts can be used to escalate privileges, move laterally, and deploy ransomware. The severity depends on the privileges of the compromised account and the sensitivity of the data it can access.
Recommendation
- Enable Audit Logon to generate the necessary events (4624, 4625) in the Windows Security Event Logs for the detection rule to function. Reference: https://ela.st/audit-logon.
- Deploy the provided Sigma rule to your SIEM to detect multiple logon failures followed by a successful logon. Tune the rule based on your environment and baseline activity.
- Investigate any triggered alerts to determine the scope of the compromise and take appropriate remediation steps.
- Consider implementing multi-factor authentication (MFA) to mitigate the risk of brute-force attacks.
- Monitor network traffic for suspicious activity originating from the source IP address associated with the brute-force attempts.
- Review and enforce strong password policies to reduce the likelihood of successful password guessing.
Detection coverage 2
Multiple Logon Failures Followed by Success - Event ID 4625/4624
mediumDetects multiple logon failures (4625) followed by a successful logon (4624) from the same source IP, indicating potential brute-force activity.
Detect Multiple Logon Failures from Same Source IP
lowDetects multiple failed login attempts from the same source IP address, indicative of brute-force attempts.
Detection queries are kept inside the platform. Get full rules →