Okta FastPass Phishing Detection

Detects when Okta FastPass prevents a user from authenticating to a phishing website.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2023/05/07"
 3integration = ["okta"]
 4maturity = "production"
 5updated_date = "2024/09/23"
 6
 7[rule]
 8author = ["Austin Songer"]
 9description = "Detects when Okta FastPass prevents a user from authenticating to a phishing website.\n"
10index = ["filebeat-*", "logs-okta*"]
11language = "kuery"
12license = "Elastic License v2"
13name = "Okta FastPass Phishing Detection"
14note = """## Setup
15
16The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
17
18This rule requires Okta to have the following turned on:
19
20Okta Identity Engine - select 'Phishing Resistance for FastPass' under Settings > Features in the Admin Console.
21"""
22references = [
23    "https://developer.okta.com/docs/reference/api/system-log/",
24    "https://developer.okta.com/docs/reference/api/event-types/",
25    "https://sec.okta.com/fastpassphishingdetection",
26    "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection",
27    "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
28    "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
29]
30risk_score = 47
31rule_id = "ee39a9f7-5a79-4b0a-9815-d36b3cf28d3e"
32severity = "medium"
33tags = ["Tactic: Initial Access", "Use Case: Identity and Access Audit", "Data Source: Okta"]
34timestamp_override = "event.ingested"
35type = "query"
36
37query = '''
38event.dataset:okta.system and event.category:authentication and
39  okta.event_type:user.authentication.auth_via_mfa and event.outcome:failure and okta.outcome.reason:"FastPass declined phishing attempt"
40'''
41
42
43[[rule.threat]]
44framework = "MITRE ATT&CK"
45[[rule.threat.technique]]
46id = "T1566"
47name = "Phishing"
48reference = "https://attack.mitre.org/techniques/T1566/"
49
50
51[rule.threat.tactic]
52id = "TA0001"
53name = "Initial Access"
54reference = "https://attack.mitre.org/tactics/TA0001/"

Setup

The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

This rule requires Okta to have the following turned on:

Okta Identity Engine - select 'Phishing Resistance for FastPass' under Settings > Features in the Admin Console.

References

Related rules

to-top