elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.92k stars 492 forks source link

[New Rule] `Successful Application SSO from Rare Unknown Client Device` #4141

Closed terrancedejesus closed 1 day ago

terrancedejesus commented 1 day ago

Pull Request

Issue link(s):

Summary - What I changed

Added a rule that detects successful single sign-on (SSO) events to Okta applications from an unrecognized or "unknown" client device, as identified by the user-agent string. This activity may be indicative of exploitation of a vulnerability in Okta's Classic Engine, which could allow an attacker to bypass application-specific sign-on policies, such as device or network restrictions. The vulnerability potentially enables unauthorized access to applications using only valid, stolen credentials, without requiring additional authentication factors.

Ref: https://trust.okta.com/security-advisories/okta-classic-application-sign-on-policy-bypass-2024/

During investigation I noticed that registered client apps whom authenticate via SSO often have the client device reported as known with a custom user-agent. As a result, this detection will catch vulnerability exploit attempts, but is prone to FPs which is why a New Terms rule was created.

Hunting

No additional Hunting query is necessary for this as the Multiple Application SSO Authentication from the Same Source can be used to identify brute-forcing or modified to add unknown for okta.client.device if using Okta integration.

How To Test

Screenshot 2024-10-07 at 10 42 13 AM

Note that this is a new terms rule so the user and raw_user_agent have to be an unusual combination for successful SSO where the client device could not be identified.

Checklist

Contributor checklist

protectionsmachine commented 1 day ago

Rule: New - Guidelines

These guidelines serve as a reminder set of considerations when proposing a new rule.

Documentation and Context

Rule Metadata Checks

New BBR Rules

Testing and Validation