Detectionmediumtest

Bitbucket User Login Failure

Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Muhammad FaisalCreated Sun Feb 2570ed1d26-0050-4b38-a599-92c53d57d45aapplication
Log Source
bitbucketaudit
Productbitbucket← raw: bitbucket
Serviceaudit← raw: audit

Definition

Requirements: "Advance" log level is required to receive these audit events.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        auditType.category: 'Authentication'
        auditType.action: 'User login failed'
    condition: selection
False Positives

Legitimate user wrong password attempts.

Rule Metadata
Rule ID
70ed1d26-0050-4b38-a599-92c53d57d45a
Status
test
Level
medium
Type
Detection
Created
Sun Feb 25
Path
rules/application/bitbucket/audit/bitbucket_audit_user_login_failure_detected.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.initial-accessattack.defense-evasionattack.credential-accessattack.t1078.004attack.t1110
View on GitHub