<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Account-Lockout — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/account-lockout/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/account-lockout/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta User Account Lockout Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-okta-account-lockout/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-okta-account-lockout/</guid><description>Detection of an Okta user account lockout, which may indicate brute-force attempts or other malicious activity targeting user accounts.</description><content:encoded><![CDATA[<p>This brief describes detection measures for Okta user account lockouts. An account lockout occurs when a user exceeds the maximum number of permitted failed login attempts, potentially indicating a brute-force attack or other unauthorized access attempts against user accounts. Monitoring for account lockouts is crucial for identifying and mitigating potential security breaches. The rule detects the &ldquo;Max sign in attempts exceeded&rdquo; message in Okta logs, which signifies that an account has been locked. Detecting this activity can alert security teams to potential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker attempts to authenticate to Okta with a valid or guessed username.</li>
<li>Attacker provides an incorrect password.</li>
<li>Okta logs the failed authentication attempt.</li>
<li>Attacker repeats steps 2 and 3 multiple times within a defined timeframe.</li>
<li>Okta&rsquo;s account lockout policy is triggered when the maximum number of failed attempts is reached.</li>
<li>Okta logs an event with the <code>displayMessage</code> &ldquo;Max sign in attempts exceeded&rdquo;.</li>
<li>The user account is locked, preventing further login attempts.</li>
<li>Security team investigates the lockout event to determine the root cause and potential impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful account lockout can disrupt legitimate user access and indicate potential malicious activity. Multiple lockouts within a short period may signify a brute-force attack aimed at gaining unauthorized access to sensitive resources. While the lockout itself prevents immediate unauthorized access, it can lead to denial of service and requires investigation to rule out successful credential compromise. The number of impacted users depends on the scope and sophistication of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Okta User Account Locked Out</code> to your SIEM to detect account lockout events in Okta logs.</li>
<li>Investigate any triggered alerts to determine the cause of the lockout, potentially indicating a brute-force attack (reference: <code>displayMessage: Max sign in attempts exceeded</code>).</li>
<li>Review and adjust Okta&rsquo;s account lockout policies to balance security and usability based on your organization&rsquo;s risk tolerance.</li>
<li>Consider implementing multi-factor authentication (MFA) to mitigate the risk of brute-force attacks and credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>account-lockout</category><category>okta</category></item></channel></rss>