Before you start
You must configure Brute Force Protection and set up logs and alerts for thresholds.
Find log events of interest
Log event types
Log event types
f:Failed user loginfu: Failed user login due to invalid usernamefp: Failed user login due to invalid passwordpwd_leak: Attempted login with a leaked passwordsignup_pwd_leak: Attempted to sign up with a leaked passwordlimit_wc: IP blocked for >10 failed login attempts to a single accountlimit_sul: User blocked for >20 login per minute from the same IP addresslimit_mu: IP blocked for >100 failed login attempts or >50 signup attemptsfcoa: Failed cross-origin authenticationscoa: Successful cross-origin authentication
Password guessing
fp, fu and fcoa log events. For more information, read Auth0’s Breached Password playbook.
Password spraying
fp, fu, and fcoa log events in your logs.
Credential stuffing
fp log events and pwd_leak log events.
Signup attacks
fs, ss and signup_pwd_leak log events.
Detection using the Auth0 Management API
date:[startdate to enddate] in YYYY-MM-DD format. For example, 2024-10-01. Use * to represent the current date.
By limiting the time of interest to a potential attack window, you can retrieve all log events of the type you’re interested. Below is an example query that searches for brute force attacks from October 1, 2024 to the present:
Mitigation strategies
- Enable Breached Password Detection or Credential Guard to protect against breached credentials with minimal user friction, noting that neither protects against dictionary attacks.
- Activate CAPTCHA for one or more flows and increase CAPTCHA frequency as needed, but remember that CAPTCHA is a deterrent, not a solution.
- Change your CAPTCHA provider if attackers bypass your current CAPTCHA or consider migrating to Auth0’s Auth Challenge or another supported provider.
- Temporarily disable account creation by everyone, including malicious actors.
- Change your web application firewall rules with an edge provider, or use tenant access control lists, to block abusive IPs, autonomous system numbers, geographic locations, TLS clients, or HTTP header elements like
user-agentstrings, and consider employing a reverse proxy. - Tighten Brute Force and Suspicious IP thresholds to reduce allowed connection limits and mitigate brute-force attacks.
- Disable unused endpoints by modifying your Cross-Origin Authentication settings if you see frequent
fcoaandscoaevents, remembering that Auth0 does not recommend using cross-origin authentication. - Enforce step-up MFA for compromised accounts, up to and including requiring for potentially compromised accounts.
- Migrate to stronger MFA options by replacing SMS or voice-based MFA with OTP or Webauthn to mitigate SMS pumping or toll fraud attacks.
- Implement SMS/voice provider security fraud protection like Twilio’s Preventing Fraud in Verify when using SMS/voice MFA.