Skip to content

Commit 526468a

Browse files
author
Patrick Bareiss
committed
new detection
1 parent 647f804 commit 526468a

File tree

1 file changed

+75
-0
lines changed

1 file changed

+75
-0
lines changed
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
name: GitHub Organizations Disable 2FA Requirement
2+
id: 3ed0d6ba-4791-4fa8-a1ef-403e438c7033
3+
version: 1
4+
date: '2025-01-17'
5+
author: Patrick Bareiss, Splunk
6+
status: production
7+
type: Anomaly
8+
description: The following analytic detects when two-factor authentication (2FA) requirements are disabled in GitHub Organizations.
9+
The detection monitors GitHub Organizations audit logs for 2FA requirement changes by tracking actor details, organization information,
10+
and associated metadata. For a SOC, identifying disabled 2FA requirements is critical as it could indicate attempts to weaken account security
11+
controls. Two-factor authentication is a fundamental security control that helps prevent unauthorized access even if passwords are compromised.
12+
Disabling 2FA requirements could allow attackers to more easily compromise accounts through password-based attacks. The impact of disabled 2FA
13+
includes increased risk of account takeover, potential access to sensitive code and intellectual property, and compromise of the software supply chain.
14+
This activity could be part of a larger attack chain where an adversary first disables security controls before attempting broader account compromises.
15+
data_source:
16+
- GitHub Organizations Audit Logs
17+
search: '`github_organizations` vendor_action=org.disable_two_factor_requirement
18+
| fillnull
19+
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_ip, actor_is_bot, actor_location.country_code, business, business_id, org, org_id, user_agent, vendor_action
20+
| eval user=actor
21+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
22+
| `github_organizations_disable_2FA_requirement_filter`'
23+
how_to_implement: You must ingest GitHub Organizations logs using Splunk Add-on for Github using a Personal Access Token https://docs.splunk.com/Documentation/AddOns/released/GitHub/Configureinputs .
24+
known_false_positives: unknown
25+
references:
26+
- https://docs.splunk.com/Documentation/AddOns/released/GitHub/Configureinputs
27+
- https://www.googlecloudcommunity.com/gc/Community-Blog/Monitoring-for-Suspicious-GitHub-Activity-with-Google-Security/ba-p/763610
28+
drilldown_searches:
29+
- name: View the detection results for - "$user$"
30+
search: '%original_detection_search% | search user = "$user$"'
31+
earliest_offset: $info_min_time$
32+
latest_offset: $info_max_time$
33+
- name: View risk events for the last 7 days for - "$user$"
34+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
35+
earliest_offset: $info_min_time$
36+
latest_offset: $info_max_time$
37+
tags:
38+
analytic_story:
39+
- GitHub Malicious Activity
40+
asset_type: GitHub
41+
confidence: 90
42+
impact: 30
43+
message: $user$ disabled 2FA requirement in GitHub Organizations
44+
mitre_attack_id:
45+
- T1562.001
46+
observable:
47+
- name: user
48+
type: User
49+
role:
50+
- Victim
51+
product:
52+
- Splunk Enterprise
53+
- Splunk Enterprise Security
54+
- Splunk Cloud
55+
required_fields:
56+
- actor
57+
- actor_id
58+
- actor_ip
59+
- actor_is_bot
60+
- actor_location.country_code
61+
- business
62+
- business_id
63+
- org
64+
- org_id
65+
- user
66+
- user_agent
67+
risk_score: 27
68+
security_domain: network
69+
tests:
70+
- name: True Positive Test
71+
attack_data:
72+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1562.001/github_disable_two_factor_requirement/github.json
73+
source: github
74+
sourcetype: github:cloud:audit
75+

0 commit comments

Comments
 (0)