Suspected brute force attack
This detection indicates that Okta has observed a high rate of failed password or MFA-based sign-in attempts, consistent with a brute force attack.
Detection risk level: Medium
A brute force attack pattern suggests that an actor is trying to guess the user's password or a valid MFA code. Remediation of this detection reduces the likelihood of account takeover.
Policy configuration
- Detection: Suspected Brute Force Attack
- Take this action: Run a Workflow to send a medium-priority alert to the SOC team for investigation
Remediation strategy
-
Investigate: The SOC team should review the System Log for the failed sign-in attempts. Identify the source IPs and the targeted account.
-
Block the threat: Enable ThreatInsight in block mode. Add the attack-source IPs to a blocked network zone.
-
Contact the user: Proactively notify the user that they're being attacked (even if unsuccessfully). Advise them to set a strong, unique password. Reset other factors if necessary.
