Vendor
Okta Admin Console Unusual Behavior Detection
2 rules 4 TTPsThis brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.
Okta Password Entered in AlternateID Field
2 rules 1 TTPOkta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.
Okta Network Zone Deactivation or Deletion
2 rules 1 TTPAn Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.
Okta Identity Provider Creation Detected
3 rules 2 TTPsAn adversary may create a rogue identity provider within Okta to establish persistence and potentially escalate privileges by impersonating legitimate users or bypassing multi-factor authentication.
Okta User Account Created
2 rules 1 TTPDetection of new user account creation in Okta, which could indicate malicious activity related to credential access.
Okta Security Threat Detected
2 rules 1 TTPThis alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.
Okta Admin Role Assignment Creation
2 rules 1 TTPDetection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.
Okta End-User Reports Suspicious Account Activity
2 rules 1 TTPAn Okta end-user reports potentially suspicious activity on their account, indicating possible compromise or unauthorized access.
Okta Alerts Following Unusual Proxy Authentication
2 rules 1 TTPAttackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.
Okta Unauthorized Application Access Attempt
3 rulesThis brief describes a detection for unauthorized application access attempts within an Okta environment, indicating a potential security breach or misconfiguration.
Okta Policy Modification or Deletion Detected
2 rules 1 TTPAn Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.
Okta MFA Reset or Deactivation Attempt
2 rules 1 TTPAn attacker attempts to disable or reset multi-factor authentication (MFA) for a user account in Okta, potentially leading to unauthorized access and account compromise.
Okta FastPass Phishing Attempt Detection
2 rules 1 TTPOkta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.
Okta Application Sign-On Policy Modified or Deleted
2 rules 1 TTPAttackers may modify or delete Okta application sign-on policies to weaken security controls, potentially leading to unauthorized access and data breaches.
Okta Application Modified or Deleted
2 rules 1 TTPDetects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.
Okta API Token Revoked
2 rules 1 TTPDetection of Okta API token revocation events, indicating potential unauthorized access or compromise.
Okta API Token Creation
2 rules 1 TTPDetection of Okta API token creation events which can indicate malicious persistence activity.
Detection of Okta Administrator Role Assignment to User or Group
2 rules 1 TTPDetects the assignment of an Okta administrator role to a user or group, potentially indicating privilege escalation or persistence attempts by malicious actors.
Okta User Session Start via Anonymizing Proxy Service
2 rules 1 TTPDetection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.
Okta User Account Lockout Detection
2 rules 1 TTPDetection of an Okta user account lockout, which may indicate brute-force attempts or other malicious activity targeting user accounts.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.