Okta Security Threat Detected
This alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.
This alert focuses on identifying security threats detected by Okta’s ThreatInsight. Okta ThreatInsight analyzes traffic patterns and user behavior to identify and block malicious login attempts, brute-force attacks, and other suspicious activities. When ThreatInsight identifies a security threat, it generates a system log event with the eventType security.threat.detected. This event serves as a high-level indicator of potential command and control activity within the Okta environment. Defenders should investigate these alerts promptly to determine the nature and scope of the threat and take appropriate remediation steps. This detection leverages Okta system logs and is relevant for organizations using Okta as their identity provider.
Attack Chain
- An attacker attempts to gain unauthorized access to an Okta account, possibly through credential stuffing or brute-force attacks.
- Okta’s ThreatInsight analyzes the login attempt, evaluating factors such as IP address reputation, geographical location, and login frequency.
- ThreatInsight identifies the login attempt as a security threat based on predefined risk factors.
- Okta generates a system log event with eventType
security.threat.detected, recording details of the suspicious activity. - The security team receives an alert based on the Sigma rule detecting the
security.threat.detectedevent. - The security team investigates the alert, examining the associated IP address, user account, and other relevant log data.
- Based on the investigation, the security team takes appropriate remediation steps, such as blocking the IP address, resetting the user’s password, or enabling multi-factor authentication.
Impact
A successful attack targeting Okta could lead to unauthorized access to sensitive data, account takeover, and disruption of services. The impact of such an attack depends on the level of access granted to the compromised account and the sensitivity of the data accessible through Okta. Successful exploitation can lead to lateral movement within an organization’s cloud infrastructure and potentially compromise other critical systems.
Recommendation
- Deploy the provided Sigma rule to your SIEM to detect
security.threat.detectedevents in Okta system logs. - Investigate all triggered alerts to determine the nature and scope of the threat.
- Review Okta’s ThreatInsight configuration to ensure it is properly configured and tuned for your environment (references: Okta ThreatInsight documentation).
- Monitor Okta system logs for suspicious activity, such as unusual login patterns, account lockouts, and password resets (references: Okta system log documentation).
- Enforce strong password policies and multi-factor authentication to reduce the risk of unauthorized access.
Detection coverage 2
Okta Security Threat Detected
mediumDetects when a security threat is detected in Okta.
Okta Brute Force Attack Detected
highDetects Okta ThreatInsight flagging a brute force attack attempt.
Detection queries are kept inside the platform. Get full rules →