Skip to main content
 
 
Splunk Lantern

Enterprise password reused via Google Chrome outside corporate resources

 

You need to search for scenarios where a user has reused their enterprise password outside corporate resources by using their password on a URL not included on a list of allowed enterprise login sites. Within Google Chrome, this is indicated by the event type passwordReuseEvent.

Required data

Ensure you are using the recommended Splunk Common Information Model (CIM) Data Loss Prevention data model. Content developed by the Splunk Security Research team requires the use of consistent, normalized data provided by the CIM. For information on installing and using the CIM, see the Common Information Model documentation.

Procedure

  1. Use field mapping to correlate the fields:
Field CIM alias

device_user

src_user

event

signature

device_name

dest

user_agent

-

result

action

url

-

reason

category

os_platform

-

browser_version

-

device_id

dvc

client_type

vendor_product

time

-

trigger_user

object

profile_user

user

 

3. Look for examples of activity, for example:

{
  "device_user": "test_user_4",
  "event": "passwordReuseEvent",
  "device_name": "Alices-gMacBookPro",
  "user_agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36",
  "result": "WARNED",
  "url": "https://login.domain.com/request?s=up.domain.com:443/uberproxy/F7Vi6p8gOMFZhB/&d=https://prosper.domain.com/%3Futm_source%3Dgo%26utm_medium%3Dgo%26upxsrf%3DAO9zFu0_8tEdjdn22qpYZpI4UpLljTti3jMD2zrqzrjI1aXpng:1611683186843&maxAge=60&authLevel=2000000&keyIds=zRI,s8x,xSS,Caq",
  "reason": "PASSWORD_REUSED_UNAUTHORIZED_SITE",
  "os_platform": "Mac OS X 10.15",
  "browser_version": "87.0.4280.141",
  "device_id": "C02D9CTCMD6M",
  "client_type": "CHROME_BROWSER",
  "time": "1611665190",
  "trigger_user": "test_user_4@domain.test"
}

Next steps

Events that appear should be investigated further and assessed against your organizational policies in this area.

Finally, you might be interested in other processes associated with the Improving Google Chrome security use case.