Spike in Successful Logon Events from a Source IP

A machine learning job found an unusually large spike in successful authentication events from a particular source IP address. This can be due to password spraying, user enumeration or brute force activity.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2021/06/10"
 3integration = ["auditd_manager", "endpoint", "system"]
 4maturity = "production"
 5updated_date = "2023/07/27"
 6min_stack_comments = "New fields added: required_fields, related_integrations, setup"
 7min_stack_version = "8.3.0"
 8
 9[rule]
10anomaly_threshold = 75
11author = ["Elastic"]
12description = """
13A machine learning job found an unusually large spike in successful authentication events from a particular
14source IP address. This can be due to password spraying, user enumeration or brute force activity.
15"""
16false_positives = [
17    """
18    Build servers and CI systems can sometimes trigger this alert. Security test cycles that include brute force or
19    password spraying activities may trigger this alert.
20    """,
21]
22from = "now-30m"
23interval = "15m"
24license = "Elastic License v2"
25machine_learning_job_id = "auth_high_count_logon_events_for_a_source_ip"
26name = "Spike in Successful Logon Events from a Source IP"
27note = """## Triage and analysis
28
29### Investigating Spike in Successful Logon Events from a Source IP
30
31This rule uses a machine learning job to detect a substantial spike in successful authentication events. This could indicate post-exploitation activities that aim to test which hosts, services, and other resources the attacker can access with the compromised credentials.
32
33#### Possible investigation steps
34
35- Identify the specifics of the involved assets, such as role, criticality, and associated users.
36- Check if the authentication comes from different sources.
37- Use the historical data available to determine if the same behavior happened in the past.
38- Investigate other alerts associated with the involved users during the past 48 hours.
39- Check whether the involved credentials are used in automation or scheduled tasks.
40- If this activity is suspicious, contact the account owner and confirm whether they are aware of it.
41
42### False positive analysis
43
44- Understand the context of the authentications by contacting the asset owners. If this activity is related to a new business process or newly implemented (approved) technology, consider adding exceptions — preferably with a combination of user and source conditions.
45
46### Response and remediation
47
48- Initiate the incident response process based on the outcome of the triage.
49- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
50- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
51"""
52references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
53risk_score = 21
54rule_id = "e26aed74-c816-40d3-a810-48d6fbd8b2fd"
55severity = "low"
56tags = ["Use Case: Identity and Access Audit", "Use Case: Threat Detection", "Rule Type: ML", "Rule Type: Machine Learning", "Tactic: Credential Access", "Tactic: Defense Evasion", "Resources: Investigation Guide"]
57type = "machine_learning"
58
59[[rule.threat]]
60framework = "MITRE ATT&CK"
61[[rule.threat.technique]]
62id = "T1110"
63name = "Brute Force"
64reference = "https://attack.mitre.org/techniques/T1110/"
65
66
67[rule.threat.tactic]
68id = "TA0006"
69name = "Credential Access"
70reference = "https://attack.mitre.org/tactics/TA0006/"
71[[rule.threat]]
72framework = "MITRE ATT&CK"
73[[rule.threat.technique]]
74id = "T1078"
75name = "Valid Accounts"
76reference = "https://attack.mitre.org/techniques/T1078/"
77[[rule.threat.technique.subtechnique]]
78id = "T1078.002"
79name = "Domain Accounts"
80reference = "https://attack.mitre.org/techniques/T1078/002/"
81[[rule.threat.technique.subtechnique]]
82id = "T1078.003"
83name = "Local Accounts"
84reference = "https://attack.mitre.org/techniques/T1078/003/"
85
86[rule.threat.tactic]
87id = "TA0005"
88name = "Defense Evasion"
89reference = "https://attack.mitre.org/tactics/TA0005/"

Triage and analysis

Investigating Spike in Successful Logon Events from a Source IP

This rule uses a machine learning job to detect a substantial spike in successful authentication events. This could indicate post-exploitation activities that aim to test which hosts, services, and other resources the attacker can access with the compromised credentials.

Possible investigation steps

  • Identify the specifics of the involved assets, such as role, criticality, and associated users.
  • Check if the authentication comes from different sources.
  • Use the historical data available to determine if the same behavior happened in the past.
  • Investigate other alerts associated with the involved users during the past 48 hours.
  • Check whether the involved credentials are used in automation or scheduled tasks.
  • If this activity is suspicious, contact the account owner and confirm whether they are aware of it.

False positive analysis

  • Understand the context of the authentications by contacting the asset owners. If this activity is related to a new business process or newly implemented (approved) technology, consider adding exceptions — preferably with a combination of user and source conditions.

Response and remediation

  • Initiate the incident response process based on the outcome of the triage.
  • Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
  • Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).

References

Related rules

to-top