Okta ThreatInsight Suspected PasswordSpray Attack

Original Source: [splunk source]
Name:Okta ThreatInsight Suspected PasswordSpray Attack
id:25dbad05-6682-4dd5-9ce9-8adecf0d9ae2
version:5
date:2025-02-10
author:Okta, Inc, Michael Haag, Splunk
status:deprecated
type:TTP
Description:**DEPRECATION NOTE** - This search has been deprecated and replaced with `Okta ThreatInsight Threat Detected`. The following analytic utilizes Oktas ThreatInsight to identify "PasswordSpray" and any included secondary outcome reasons. This event will trigger when a brute force attempt occurs with unknown usernames attempted.
Data_source:
search:`okta` eventType="security.threat.detected" AND outcome.reason="Password Spray"
| stats count min(_time) as firstTime max(_time) as lastTime values(displayMessage) by eventType client.userAgent.rawUserAgent client.userAgent.browser outcome.reason
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `okta_threatinsight_suspected_passwordspray_attack_filter`


how_to_implement:This search is specific to Okta and requires Okta logs to be ingested in your Splunk deployment.
known_false_positives:Fidelity of this is high as it is Okta ThreatInsight. Filter and modify as needed.
References:
  -https://help.okta.com/en-us/Content/Topics/Security/threat-insight/configure-threatinsight-system-log.htm
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Suspicious Okta Activity'
  asset_type:Infrastructure
  mitre_attack_id:
    - 'T1078.001'
    - 'T1110.003'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  security_domain:access

tests:
  :
manual_test:None

Related Analytic Stories


Suspicious Okta Activity