Feb 27 2023 11:33 AM - edited Feb 27 2023 11:41 AM
Suspected brute-force attack (Kerberos, NTLM) and None of the passwords attempted where previously used passwords.
This makes me wonder. It knows it is a password that was not used before. But did the account try to login 100x times with this password or did it do 100x times a try with 100 passwords that where not used before.
If it is the 100 tries with just 1 never used password it is possible just someone who made a typo in a script (password) for example.
If it was 100 different password it is a much bigger issue.
I can not find this the documentation how i should read this. I am also not aware if there is a option to figure this out (kusto query for example).
Anyone a idea?
Feb 27 2023 11:24 PM
Feb 28 2023 08:43 AM
Feb 28 2023 10:56 PM - edited Feb 28 2023 11:04 PM
Feb 28 2023 10:56 PM - edited Feb 28 2023 11:04 PM
Sure is worth investigating
So, I guess this one you already figured out it was a script, or similar, using the wrong password... which for an AI system looks like a brute force attack...
So, this one is benign positive then
Guess "Suspected" is key in this case....
Microsoft Defender for Identity security alert guide - Microsoft Defender for Identity | Microsoft L...
Microsoft Defender for Identity compromised credentials phase security alerts - Microsoft Defender f...
So, it is based on authentication attempts... but i guess it doesn't compare the hashes. But then again, how would it detect a password spray, or know the password wasn't used.
Probably the underlaying detection algorithms will not be shared for security reasons. So lets just go with what we know:
Get an alert, investigate
Apr 26 2023 04:09 AM