Okta 2023 Breach Indicator Of Compromise
Detects new user account creation or activation with specific names related to the Okta Support System 2023 breach. This rule can be enhanced by filtering out known and legitimate username used in your environnement.
Sigma rule (View on GitHub)
1title: Okta 2023 Breach Indicator Of Compromise
2id: 00a8e92a-776b-425f-80f2-82d8f8fab2e5
3status: test
4description: |
5 Detects new user account creation or activation with specific names related to the Okta Support System 2023 breach.
6 This rule can be enhanced by filtering out known and legitimate username used in your environnement.
7author: Muhammad Faisal (@faisalusuf)
8date: 2023-10-25
9references:
10 - https://www.beyondtrust.com/blog/entry/okta-support-unit-breach
11 - https://developer.okta.com/docs/reference/api/event-types/
12tags:
13 - attack.credential-access
14 - detection.emerging-threats
15logsource:
16 service: okta
17 product: okta
18detection:
19 selection:
20 eventtype:
21 - 'user.lifecycle.create'
22 - 'user.lifecycle.activate'
23 target.user.display.name|contains: 'svc_network_backup'
24 condition: selection
25falsepositives:
26 - Unknown
27level: medium
References
Related rules
- APT31 Judgement Panda Activity
- CVE-2021-31979 CVE-2021-33771 Exploits
- CVE-2021-31979 CVE-2021-33771 Exploits by Sourgum
- CVE-2023-23397 Exploitation Attempt
- GALLIUM Artefacts - Builtin