Possible Impossible Travel Pattern - SSO

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-12-01
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Hour

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • AzureAD
      OR
    • Azure SignIn Log
      OR
    • Duo
      OR
    • Okta
      OR
    • OneLogin
      OR
    • PingOne

Detection Modules

Identity Analytics

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

A user logged in from several countries in a short period, including at least one location that is rare for the user or organization.
This suspicious activity may be a sign of credential theft.

Attacker's Goals

An attacker who compromises user credentials will leverage those credentials to gain initial access to the corporate network.
To obfuscate their true origin, adversaries commonly route traffic through proxies or VPNs across multiple geographic locations.

Investigative actions

  • Review the source IPs and AS organizations. Check if they are associated with known corporate VPNs, cloud hosting providers, or personal VPN services.
  • Examine recent activity associated with the user in the relevant SSO provider, focusing on suspicious actions such as MFA changes or unusual data access.

Variations

Azure First-Seen Device - Impossible Traveler

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user logged in from several countries in a short period, including at least one location that is rare for the user or organization.
This suspicious activity may be a sign of credential theft.

Attacker's Goals

An attacker who compromises user credentials will leverage those credentials to gain initial access to the corporate network.
To obfuscate their true origin, adversaries commonly route traffic through proxies or VPNs across multiple geographic locations.

Investigative actions

  • Review the source IPs and AS organizations. Check if they are associated with known corporate VPNs, cloud hosting providers, or personal VPN services.
  • Examine recent activity associated with the user in the relevant SSO provider, focusing on suspicious actions such as MFA changes or unusual data access.


Rare Country Login - Impossible Traveler (SSO)

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user logged in from several countries in a short period, including at least one location that is rare for the user or organization.
This suspicious activity may be a sign of credential theft.

Attacker's Goals

An attacker who compromises user credentials will leverage those credentials to gain initial access to the corporate network.
To obfuscate their true origin, adversaries commonly route traffic through proxies or VPNs across multiple geographic locations.

Investigative actions

  • Review the source IPs and AS organizations. Check if they are associated with known corporate VPNs, cloud hosting providers, or personal VPN services.
  • Examine recent activity associated with the user in the relevant SSO provider, focusing on suspicious actions such as MFA changes or unusual data access.