Okta Multiple OS Names Detected for a Single DT Hash
Identifies when a single Okta device token hash (dt_hash) is associated with multiple operating system types. This is highly anomalous because a device token is tied to a specific device and its operating system. This alert strongly indicates that an attacker has stolen a device token and is using it to impersonate a legitimate user from a different machine.
Rule type: threshold
Rule indices:
- logs-okta.system-*
Rule Severity: high
Risk Score: 73
Runs every:
Searches indices from: now-60m
Maximum alerts per execution: ?
References:
Tags:
- Domain: Identity
- Data Source: Okta
- Data Source: Okta System Logs
- Use Case: Threat Detection
- Tactic: Credential Access
- Resources: Investigation Guide
Version: ?
Rule authors:
- Elastic
Rule license: Elastic License v2
This rule detects when a single Okta device token hash (dt_hash) is associated with multiple operating system types. This is highly anomalous because a device token is tied to a specific device and its operating system. This alert strongly indicates that an attacker has stolen a device token token and is using it to impersonate a legitimate user from a different machine.
- Review the
okta.debug_context.debug_data.dt_hashfield to identify the specific device trust hash associated with multiple operating systems. - Examine the
user.emailfield to determine which user account is associated with the suspicious activity - Analyze the
source.ipfield to identify the IP addresses from which the different operating systems were reported. Look for any unusual or unexpected locations. - Review the
user_agent.os.namefield to see the different operating systems reported for the same dt_hash. This will help identify the nature of the anomaly. - Check the
event.actionfield to understand the context of the authentication events (e.g., MFA verification, standard authentication). - Investigate the timeline of events to see when the different operating systems were reported for the same dt_hash. Look for patterns or sequences that may indicate malicious activity.
- Correlate this activity with other security events in your environment, such as failed login attempts, unusual access patterns, or alerts from endpoint security solutions.
- Applications will tag the operating system as null when the device is not recognized as a managed device
- In environments where users frequently switch between managed and unmanaged devices, this may lead to false positives.
- Immediately investigate the user account associated with the suspicious activity to determine if it has been compromised.
- If compromise is confirmed, reset the user's credentials and enforce multi-factor authentication (MFA)
- Revoke any active sessions associated with the compromised account to prevent further unauthorized access.
- Review and monitor the affected dt_hash for any further suspicious activity.
- Educate users about the importance of device security and the risks associated with device tokens.
- Implement additional monitoring for device token tokens and consider using conditional access policies to restrict access based on device compliance status.
data_stream.dataset: "okta.system"
and not okta.debug_context.debug_data.dt_hash: "-"
and user_agent.os.name: *
and event.action: (
"user.authentication.verify" or
"user.authentication.auth_via_mfa"
)
Framework: MITRE ATT&CK
Tactic:
- Name: Credential Access
- Id: TA0006
- Reference URL: https://attack.mitre.org/tactics/TA0006/
Technique:
- Name: Steal Web Session Cookie
- Id: T1539
- Reference URL: https://attack.mitre.org/techniques/T1539/