Skip to content

Add Azure AD password spray detection via SigninLogs (T1110.003)#5896

Closed
truvineweb wants to merge 1 commit into
SigmaHQ:masterfrom
truvineweb:master
Closed

Add Azure AD password spray detection via SigninLogs (T1110.003)#5896
truvineweb wants to merge 1 commit into
SigmaHQ:masterfrom
truvineweb:master

Conversation

@truvineweb
Copy link
Copy Markdown

Summary of the Pull Request

Adds a new Sigma detection rule for T1110.003 (Brute Force: Password Spraying) targeting Azure AD SigninLogs. The rule detects a single source IP generating failed authentications against more than 3 distinct user accounts within a 10-minute window. This complements existing identity_protection rules which rely on Entra ID Protection's riskdetection service and require P2 licensing — this rule uses raw SigninLogs and is deployable without P2.

Changelog

new: Password Spray Attack via Azure AD Sign-In Logs (T1110.003) — aggregation-based detection using SigninLogs

Example Log Event

N/A — rule uses aggregation condition across multiple events

Fixed Issues

N/A

SigmaHQ Rule Creation Conventions

  • logsource: product: azure, service: signinlogs
  • status: test
  • falsepositives documented
  • MITRE ATT&CK tag: attack.t1110.003

Add Azure AD password spray detection via SigninLogs (T1110.003)
@github-actions github-actions Bot added Rules Review Needed The PR requires review labels Mar 8, 2026
@nasbench nasbench mentioned this pull request Apr 28, 2026
12 tasks
@nasbench
Copy link
Copy Markdown
Member

Correlation is not yet supported hence we will be closing this PR and moving it to #5759 where we are evaluting correlation support for this repo.

Thanks once again

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants