Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
1 Hour |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A user logged in from several countries in a short period, including at least one location that is rare for the user or organization.
This suspicious activity may be a sign of credential theft.
Attacker's Goals
An attacker who compromises user credentials will leverage those credentials to gain initial access to the corporate network.
To obfuscate their true origin, adversaries commonly route traffic through proxies or VPNs across multiple geographic locations.
Investigative actions
- Review the source IPs and AS organizations. Check if they are associated with known corporate VPNs, cloud hosting providers, or personal VPN services.
- Examine recent activity associated with the user in the relevant SSO provider, focusing on suspicious actions such as MFA changes or unusual data access.
Variations
Azure First-Seen Device - Impossible TravelerRare Country Login - Impossible Traveler (SSO)