
Summary
This rule triggers an alert when a user in an Okta-managed environment reports suspicious activity, indicating potential malicious behavior associated with the threat actor known as Scatter Swine. The detection logic queries the Okta application logs for events occurring within the last 2 hours that match the event type 'user.account.report_suspicious_activity_by_enduser'. By focusing on this specific event, the rule aims to detect instances where users take notice of anomalous behavior with their accounts, potentially signaling compromised account activity or account misuse which may require further investigation. The associated techniques, including exploitation of valid cloud accounts for persistent access and privilege escalation, highlight the critical nature of user reporting in recognizing and mitigating risks posed by threat actors.
Categories
- Cloud
- Identity Management
Data Sources
- Application Log
ATT&CK Techniques
- T1078.004
- T1078
Created: 2024-02-09