Skip to content
Threat Feed
medium advisory

Okta Security Threat Detected

This alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.

This alert focuses on identifying security threats detected by Okta’s ThreatInsight. Okta ThreatInsight analyzes traffic patterns and user behavior to identify and block malicious login attempts, brute-force attacks, and other suspicious activities. When ThreatInsight identifies a security threat, it generates a system log event with the eventType security.threat.detected. This event serves as a high-level indicator of potential command and control activity within the Okta environment. Defenders should investigate these alerts promptly to determine the nature and scope of the threat and take appropriate remediation steps. This detection leverages Okta system logs and is relevant for organizations using Okta as their identity provider.

Attack Chain

  1. An attacker attempts to gain unauthorized access to an Okta account, possibly through credential stuffing or brute-force attacks.
  2. Okta’s ThreatInsight analyzes the login attempt, evaluating factors such as IP address reputation, geographical location, and login frequency.
  3. ThreatInsight identifies the login attempt as a security threat based on predefined risk factors.
  4. Okta generates a system log event with eventType security.threat.detected, recording details of the suspicious activity.
  5. The security team receives an alert based on the Sigma rule detecting the security.threat.detected event.
  6. The security team investigates the alert, examining the associated IP address, user account, and other relevant log data.
  7. Based on the investigation, the security team takes appropriate remediation steps, such as blocking the IP address, resetting the user’s password, or enabling multi-factor authentication.

Impact

A successful attack targeting Okta could lead to unauthorized access to sensitive data, account takeover, and disruption of services. The impact of such an attack depends on the level of access granted to the compromised account and the sensitivity of the data accessible through Okta. Successful exploitation can lead to lateral movement within an organization’s cloud infrastructure and potentially compromise other critical systems.

Recommendation

  • Deploy the provided Sigma rule to your SIEM to detect security.threat.detected events in Okta system logs.
  • Investigate all triggered alerts to determine the nature and scope of the threat.
  • Review Okta’s ThreatInsight configuration to ensure it is properly configured and tuned for your environment (references: Okta ThreatInsight documentation).
  • Monitor Okta system logs for suspicious activity, such as unusual login patterns, account lockouts, and password resets (references: Okta system log documentation).
  • Enforce strong password policies and multi-factor authentication to reduce the risk of unauthorized access.

Detection coverage 2

Okta Security Threat Detected

medium

Detects when a security threat is detected in Okta.

sigma tactics: command-and-control sources: okta, okta

Okta Brute Force Attack Detected

high

Detects Okta ThreatInsight flagging a brute force attack attempt.

sigma tactics: credential_access techniques: T1110 sources: okta, okta

Detection queries are kept inside the platform. Get full rules →