VPN login Brute-Force attempt

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-05-13
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Hour

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Palo Alto Networks Global Protect
      OR
    • Third-Party VPNs

Detection Modules

Identity Analytics

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

A user account failed to log in to a VPN service multiple times in a short time period. This may indicate a brute-force attack.

Attacker's Goals

An attacker attempts to gain access to the account.

Investigative actions

  • Verify successful connections by the user account, as these can indicate the attacker managed to guess the credentials.
  • Analyze login patterns for abnormal times, locations, or IPs for suspicious activity.
  • Look for VPN login attempts from countries where the organization does not typically operate.
  • Cross-reference the IP addresses with threat intelligence sources.
  • Follow further actions taken by the account.

Variations

VPN Login Brute Force

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user account failed to log in to a VPN service multiple times in a short time period. This may indicate a brute-force attack.

Attacker's Goals

An attacker attempts to gain access to the account.

Investigative actions

  • Verify successful connections by the user account, as these can indicate the attacker managed to guess the credentials.
  • Analyze login patterns for abnormal times, locations, or IPs for suspicious activity.
  • Look for VPN login attempts from countries where the organization does not typically operate.
  • Cross-reference the IP addresses with threat intelligence sources.
  • Follow further actions taken by the account.