Cisco Duo - Multiple failed logon attempts

Entities: User, IP Log type: Cisco Duo

Playbook Description

This playbook analyzes failed logon reasons, checks IP reputation, blocks malicious IPs, verifies successful logons, assesses device health, disables compromised accounts, and notifies the security team.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Credential Access(TA0006) Brute Force(T1110) Password Guessing(T1110.001)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Harden(D3-Harden) Application Hardening(D3-AH) Application Configuration Hardening(D3-ACH)

Playbook input type

Alert

Prerequisites

  • VirusTotal API - Need to connect with VirusTotal API and fetch access key to check the malware IPdetails.
  • Cisco Duo configuration - Need to connect Cisco Duo using HMAC connection with Integration and secret key.

Playbook creation input

  • connectionName - Provide the VirusTotal connection name for executing the VirusTotal APIs

Dependencies

Extensions - VirusTotal

  • virustotal_ipReputation
  • virustotal_calculateRiskScore
  • ciscoduo_modifyUser
  • ciscoduo_retrieveEndpointById

Extensions - Cisco Duo

  • ciscoduo_modifyUser
  • ciscoduo_retrieveEndpointById

Utility functions:

  • utility_parseAggregateLog
  • utility_compareListElements
  • utility_analyseDeviceHealthResult
  • utility_extractMaliciousEntitiesByRiskScore
  • utility_getRequiredTime
  • utility_convertTimeToUTC
  • utility_convertToString
  • utility_sendMail

Connections

VirusTotal connection - Need to connect with VirusTotal API and fetch access key to check the malware IP/URL/File details.

Cisco Duo connection - Need to connect Cisco Duo using Integration Key, Secret Key and API Hostname.

Sub playbooks

  • Cisco Duo - Block IP

Execution workflow

Investigation:

  • Fetches the reason from aggregated log.
  • Checks the logon failure reason.

Decision logic:

  • Proceeds to remediation based on the following conditions:
    • Related investigation findings are present.
  • If no malicious indicators are confirmed, the playbook ends with no further actions.

Remediation:

  • Parses the IP address.
  • Checks the IP reputation in batch.
  • Calculates the IP risk score in batch.
  • Identifies malicious entities based on their risk scores.
  • Checks whether IP is malicious.
  • Executes the "Cisco Duo - Block IP" sub-playbook.
  • Checks for the successful logon.
  • Checks whether successful logon exists.
  • Checks the device health.
  • Analyzes endpoint details.
  • Checks whether device is malicious.
  • Formats input for disabling user.
  • Disables the user.
  • Passes user and logon handling.
  • Validates that all remediation actions are completed successfully.
  • Builds the mail subject.
  • Builds the notification email with the analysis results.
  • Sends a notification email regarding the actions taken and required next steps.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

  • Review blocked IP addresses to ensure no legitimate traffic was affected.
  • Investigate whether the compromised account was used to access any sensitive applications.
  • Review Cisco Duo authentication logs for additional unauthorized access attempts.
  • Verify device health status and assess whether compromised devices need remediation.
  • Consider enforcing additional MFA factors for the affected user before re-enabling access.
  • Audit other accounts for similar failed logon patterns.