CrowdStrike - Concurrent user login containment

Entities: User Log type: CrowdStrike Falcon

Playbook Description

This playbook detects concurrent logins on the same user account, analyzes login patterns and IP reputation, and if deemed malicious, it revokes sessions, enforces password reset, and blocks the source IP to prevent further unauthorized access.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Credential Access(TA0006) Brute Force(T1110) Password Spraying(T1110.003)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Evict(D3-Evict) Credential Eviction(D3-CE) Account Locking(D3-AL)

Playbook input type

Alert

Prerequisites

  • VirusTotal API - Need to connect with VirusTotal API and fetch access key to check the malware IP details.
  • CrowdStrike configuration - Need to connect CrowdStrike using OAuth 2.0 connection with clientId and clientSecret, Authorize URL, Access Token URL, Refresh Token URL.

Playbook creation input

  • connectionName - Provide the VirusTotal connection name for executing the VirusTotal APIs

Dependencies

Extensions - CrowdStrike

  • crowdstrike_retrieveUserUuid
  • crowdstrike_resetUserPassword
  • crowdstrike_getUserRoleId
  • crowdstrike_revokeUserRole
  • virustotal_ipReputation
  • virustotal_calculateRiskScore

Extensions - VirusTotal

  • virustotal_ipReputation
  • virustotal_calculateRiskScore

Utility functions:

  • utility_getRequiredTime
  • utility_extractFieldFromList
  • utility_extractMaliciousEntitiesByRiskScore
  • utility_convertToString
  • utility_sendMail

Connections

CrowdStrike connection - OAuth2 connection with clientId and client secret along with region.

VirusTotal connection - Need to connect with VirusTotal API and fetch access key to check the malware IP/URL/File details.

Sub playbooks

  • CrowdStrike Falcon - Block IP

Execution workflow

Investigation:

  • Retrieves the user UUID.
  • Retrieves user roles.
  • Retrieves logon failures.
  • Extracts the IP list.
  • Checks the IP reputation in batch.
  • Calculates the risk score in batch.
  • Identifies malicious entities based on their risk scores.

Decision logic:

  • Proceeds to remediation based on the following conditions:
    • Multiple logon failures were detected within the investigation period.
  • If suspicious but not confirmed malicious, sends a notification for manual review and stops further actions.
  • If no malicious indicators are confirmed, the playbook ends with no further actions.

Remediation:

  • Executes the "CrowdStrike Falcon - Block IP" sub-playbook.
  • Enforces the password reset.
  • Fetches user role IDs.
  • Revokes the user role.
  • Validates if all remediation actions are completed successfully.
  • Builds the notification email with remediation details and findings.
  • Sends a notification email regarding the actions taken and required next steps.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

  • Review blocked IP addresses to ensure no legitimate traffic was affected.
  • Investigate whether the compromised account was used to access sensitive resources.
  • Audit other accounts for similar concurrent login patterns.