Okta FastPass Phishing Detection

Detects when Okta FastPass prevents a user from authenticating to a phishing website.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2023/05/07"
 3integration = ["okta"]
 4maturity = "production"
 5updated_date = "2024/12/09"
 6min_stack_version = "8.15.0"
 7min_stack_comments = "Breaking change at 8.15.0 for the Okta Integration."
 8
 9[rule]
10author = ["Austin Songer"]
11description = "Detects when Okta FastPass prevents a user from authenticating to a phishing website.\n"
12index = ["filebeat-*", "logs-okta*"]
13language = "kuery"
14license = "Elastic License v2"
15name = "Okta FastPass Phishing Detection"
16note = """## Setup
17
18The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
19
20This rule requires Okta to have the following turned on:
21
22Okta Identity Engine - select 'Phishing Resistance for FastPass' under Settings > Features in the Admin Console.
23"""
24references = [
25    "https://developer.okta.com/docs/reference/api/system-log/",
26    "https://developer.okta.com/docs/reference/api/event-types/",
27    "https://sec.okta.com/fastpassphishingdetection",
28    "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection",
29    "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
30    "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
31]
32risk_score = 47
33rule_id = "ee39a9f7-5a79-4b0a-9815-d36b3cf28d3e"
34severity = "medium"
35tags = ["Tactic: Initial Access", "Use Case: Identity and Access Audit", "Data Source: Okta"]
36timestamp_override = "event.ingested"
37type = "query"
38
39query = '''
40event.dataset:okta.system and event.category:authentication and
41  okta.event_type:user.authentication.auth_via_mfa and event.outcome:failure and okta.outcome.reason:"FastPass declined phishing attempt"
42'''
43
44
45[[rule.threat]]
46framework = "MITRE ATT&CK"
47[[rule.threat.technique]]
48id = "T1566"
49name = "Phishing"
50reference = "https://attack.mitre.org/techniques/T1566/"
51
52
53[rule.threat.tactic]
54id = "TA0001"
55name = "Initial Access"
56reference = "https://attack.mitre.org/tactics/TA0001/"

Setup

The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

This rule requires Okta to have the following turned on:

Okta Identity Engine - select 'Phishing Resistance for FastPass' under Settings > Features in the Admin Console.

References

Related rules

to-top