General
This rule allows Attic to check successful login attempts on the tenant for suspicious User Agents.
Rationale
Research has shown that AiTM attackers log in to Microsoft environments using specific, relatively uncommon user agents. Detections of these user agents should therefore be investigated for potential misuse.
Attic Fix
A Fix is available for this detection which blocks the account in question. This action prevents further damage, but it is advisable to conduct follow-up investigation into the activities of the account since the login attempt.
If you have an IR Subscription, engage our experts to perform the follow-up investigation.
Manual follow-up
Follow these steps to adequately handle this detection:
- Open the Entra admin portal: https://entra.microsoft.com
- Go to Identity, then Monitoring & Health, and then Sign-in logs
- Locate the log entry from the Attic alert
- Investigate the login attempt and, only if it can be determined that the alert is a false positive:
- Block the user account
- Reset the password and revoke logged-in sessions
- Investigate the account for suspicious behavior, changed authentication methods, and suspicious App Consents. Zolder can assist with this.
- Only re-enable the account when it is deemed safe for use again.
Comments
0 comments
Please sign in to leave a comment.