heroui logo

Impossible Travel for Login Action

Panther Rules

View Source
Summary
The 'Impossible Travel for Login Action' detection rule is designed to identify suspicious login activity by a user originating from geographically disparate locations in a time frame that would make such travel physically impossible. This detection leverages logs analyzed from platforms such as AWS CloudTrail, Okta, Asana, and Notion. The determination is made based on subsequent user sessions where the login timestamps are not only close together but also from locations that are significantly distant—implying that one or both of the logins is likely to be fraudulent. The rule includes several tests tailored to validate login events, including checks for successful logins on AWS console, Okta session starts, and false negatives for consecutive logouts or unsuccessful events. In the event of an alert, protocol involves reaching out to the user to confirm the authenticity of the login attempts and potentially locking the account if necessary. This rule specifically aims to mitigate risks associated with identity theft and compromised credentials, aligning with the MITRE ATT&CK framework under 'Valid Accounts' (T1078).
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • User Account
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2023-06-01