Skip to main content
Easy difficultyIdentity & Access15-20 minutes
SIEMFirewall

Brute Force Attack Investigation

When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying the source IP, determining if any attempts succeeded, checking for credential stuffing patterns, and assessing whether the account is now compromised. Block the source IP at the firewall and enforce account lockout policies. Escalate if any login succeeded after the brute force attempt.

Overview

Brute force attacks are among the most common and earliest-detected attacks in any environment. Attackers use automated tools to try thousands of password combinations against authentication endpoints, hoping to find weak credentials. While noisy and easy to detect, brute force attacks are dangerous when they succeed; a single compromised account can be the entry point for a full network breach.

This playbook covers the investigation of both traditional brute force (one account, many passwords) and credential stuffing (many accounts, leaked passwords) variants. You will learn to assess the scope, determine success, and implement containment.

When You See This

  1. 1

    SIEM alert for excessive failed authentication attempts from a single source IP

  2. 2

    Account lockout events affecting multiple users simultaneously

  3. 3

    Authentication logs showing hundreds of failed attempts followed by a single success

  4. 4

    IDS/IPS alert for password spraying or credential stuffing patterns

Investigation Steps

  1. 1

    Identify scope and source

    Determine how many accounts are targeted, the source IP(s), and the authentication endpoint under attack. Check if the source is internal (compromised host or insider) or external. Review geolocation data for the source IP and check it against threat intelligence.

    SIEM
    index=auth action=failure | stats count by src_ip, user, app | where count > 10 | sort -count
    index=auth action=failure src_ip="attacker_ip" | timechart span=1m count by user
  2. 2

    Determine if any attempt succeeded

    Search for successful authentication events from the same source IP or for the targeted accounts. Pay special attention to a success that occurs immediately after many failures; this is the strongest signal of a brute force compromise.

    SIEM
    index=auth src_ip="attacker_ip" action=success | stats earliest(_time) as first_success, count by user, app
    index=auth user="targeted_user" action=success | where src_ip!="known_ranges" | table _time, src_ip, app, action

    Decision Point

    If: A successful login occurred from the attacking IP

    Yes → This is a confirmed compromise. Immediately disable the account, reset credentials, and escalate to Incident Response.

    No → No successful access. Proceed to containment; block the source IP and verify account lockout policies are working.

  3. 3

    Check for credential stuffing patterns

    If multiple accounts are targeted with only 1-3 attempts each (vs. hundreds against one account), this is credential stuffing using leaked password databases rather than traditional brute force. Search for the targeted usernames in known breach databases and assess the risk differently.

    SIEM
    index=auth action=failure | stats dc(user) as unique_users, count as total_attempts by src_ip | where unique_users > 5
  4. 4

    Contain and remediate

    Block the attacking IP at the firewall. If credentials were compromised, force password reset and revoke sessions. Review account lockout policies and MFA enforcement. If this is credential stuffing, consider mandatory password resets for all targeted accounts.

    FirewallSIEM
  5. 5

    Document and improve defenses

    Record the attack timeline, source details, targeted accounts, and outcome. Recommend improvements such as enforcing MFA, implementing rate limiting, or deploying an account lockout threshold if one does not exist.

    SIEM

Common Mistakes

  1. 1

    Focusing only on failed attempts without checking if any login eventually succeeded

  2. 2

    Blocking the IP at the firewall but not checking for VPN or proxy rotation by the attacker

  3. 3

    Ignoring credential stuffing patterns where each account gets only 1-3 attempts

Escalation Criteria

  • Any successful login from the attacking source after brute force attempts

  • Internal source IP conducting brute force (indicates compromised host)

  • Targeted accounts have privileged access (admin, service accounts)

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including brute force attack investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

What is the difference between brute force and credential stuffing?
Brute force tries many passwords against one account. Credential stuffing tries leaked username/password pairs from other breaches against your systems. Credential stuffing is harder to detect because each account only gets 1-3 attempts, staying below most lockout thresholds.
Should I always block the source IP?
Yes, if the source is external and clearly malicious. However, check if it is a shared IP (VPN provider, cloud service, CDN) before blocking, as you could impact legitimate users. For cloud provider IPs, consider blocking the specific authentication endpoint rather than the entire IP.
How do I practice brute force investigations?
SOCSimulator includes brute force attack scenarios in Operations rooms and Shift Mode. Practice identifying attack patterns, assessing success, and implementing containment, all with realistic SIEM logs. Start free forever.
Technique

Brute Force (T1110) — Detection Training

Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes…

Read more
Technique

Valid Accounts (T1078) — Detection Training

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…

Read more
Glossary

What is Brute Force Attack? — SOC Glossary

A brute force attack systematically tries large numbers of username and password combinations, or decryption keys, until…

Read more
Glossary

What is MFA? — SOC Glossary

Multi-Factor Authentication (MFA) requires users to provide two or more independent verification factors (something you …

Read more
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Career Path

SOC Analyst (Tier 1) Career Guide — Salary & Skills

Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more
Playbook

Lateral Movement Investigation — Investigation Playbook

When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to…

Read more

We use cookies to improve your experience and measure usage. Learn more