
Summary
The 'Okta Non-Standard VPN Usage' detection rule is designed to identify potential threats associated with Remote Employment Fraud (REF) actors who utilize virtual private networks (VPNs) to obscure their true location and facilitate unauthorized access to services, such as Okta. By monitoring debug contexts within Okta logs, this rule detects connections made through known VPN providers associated with suspicious activity. The implementation relies on parsing entries from Okta Identity Cloud through the Splunk Add-on, leveraging a search query to filter and evaluate user inclinations towards non-standard VPNs that could indicate fraud. The detection looks for specific patterns in the debug data of VPN connections, categorizing the events by their success or failure alongside various user attributes and geographical relevance. The rule's reliability is enhanced by a strict baseline for acceptable VPN usage to limit false positives, making it a valuable component in safeguarding identities and ensuring legitimate access to underlying services.
Categories
- Identity Management
- Cloud
Data Sources
- User Account
- Logon Session
- Application Log
ATT&CK Techniques
- T1078
- T1572
- T1090
Created: 2025-06-03