Blogs | InSpark

Brute force vs. Password Spray attack in Azure Sentinel

Geschreven door InSpark | Jul 16, 2024 8:43:59 AM

The purpose of this blog is to explain the difference between ‘brute force,’ and ‘password spray’ attacks with real-world data and visualization via the Azure Sentinel Logs (e.g., Hunting) and Workbooks feature.

Brute force attack

A brute password attack is using multiple passwords (automated via a password file, for example) to attack one user account. This attack is easily detected by security systems, and the account is locked out, for example (Azure AD Smart Lockout is a feature to protect the user against this type of attack).

Password spray attack

A password spray attack is using one (often used) password to attack multiple users. This attack method is not easily detected by security systems.

Azure Sentinel

Azure Sentinel can be used to detect and visualize both types of attacks. The required Data Connector is Azure Active Directory (which requires at least on Azure AD Premium P1 licenseSigninLogs.

Logs

The Logs section provides easy access to the KQL to query the data in the log analytics workspace (which can be later used in Incident- or Hunting rules). The Table which we will use is SigninLogs, and the column for the alerts is ResultType. 

Table Column Value Description
SigninLogs ResultType 50126 Invalid username or password
SigninLogs ResultType 50053 Account is locked | Sign-in was blocked

Brute Force Attack

The query to use must only show the ResultType(s) from > one IP-address & > one Country. The result is the query below (set the time range to 7 or 30 days, for example).

The output of the query is shown below (names are anonymized).

As you can see, user ‘anonymous’ is attacked by different IP-addresses (258) from different countries. Unless user ‘anonymous’ is making a ‘world trip,’ this can be an example of brute password attack, different IP-addresses and countries are used to hide detection.

Password Spray attack

The query to use must only show the ResultType(s) from > 1 User(s). The result is the query below (set the time range to 7 or 30 days, for example).

The output of the query is shown below (names are anonymized).

The output shows an IP-address (219.93.121.22, which is Malaysia, see https://www.abuseipdb.com/check/219.93.121.22) attacking multiple users within the organization. This can be an example of a password spray attack.

Workbooks

Workbooks can be used to provide an overview of the attacks visible on a world map (for example, Asia might be more malicious then Europe for a Dutch organization). We can use the information (query and map settings) below to get a visual world map of the password attack(s) on the Office 365 (Azure AD) Tenant.

 The result is the world map below with attack origin by Country.

Conclusion

If you got any questions about Azure Sentinel or Microsoft Security in general (Microsoft 365 E5, for example), please contact us.