Before you start
You must configure Breached Password Protection and set up alerts for thresholds.
Find log events of interest
Relevant log event types
Relevant log event types
f: failed user loginfu: failed user login due to invalid usernamefp: failed user login due to invalid passwordpwd_leak: attempted login with a leaked passwordsignup_pwd_leak: attempted to sign up with a leaked passwordfcoa: failed cross-origin authentication (these events are generated by/co/authenticate, which should not be enabled unless strictly required)scoa: successful cross-origin authentication (these events are generated by/co/authenticate, which should not be enabled unless strictly required)
Identify breached password attacks
Password guessing
fp, fu and fcoa events in your Auth0 log events.
Password spraying
fp, fu and fcoa events in your logs are the best way to see whether attackers are attempting password spraying attacks.
Credential stuffing
fp events (because the attackers are more likely to know a user exists) and pwd_leak events (because attackers are attempting to log in using breached credentials).
Mitigation strategies
- User friction**:** evaluate the impact of mitigation measures (e.g. CAPTCHA frequency, passkey requirements, or ) on user experience.
- Technical capacity: assess your ability to implement IP blocking, WAF rules, and MFA enforcement.
- Turn on Bot Detection and block compromised credentials, up to and including requiring MFA for potentially compromised accounts.
- Activate CAPTCHA for one or more flows and increase CAPTCHA frequency as needed, but remember that CAPTCHA is a deterrent, not a solution. For more information about , read the Bot Detection playbook.
- Change your CAPTCHA provider if attackers bypass your current CAPTCHA or consider migrating to Auth0’s Auth Challenge or another supported provider.
- Change your web application firewall rules using an edge provider or use tenant access control lists to block abusive IPs, autonomous system numbers, geographic locations, TLS clients, or HTTP header elements like
user-agentstrings. - Tighten Brute Force and Suspicious IP thresholds to reduce allowed connection limits and mitigate brute-force attacks.
- Disable stateless endpoints susceptible to credential stuffing attacks by modifying your Cross-Origin Authentication settings.