Defense in Depth

Tracking Anomalous Behaviors of Legitimate Identities

11 snips
Feb 15, 2024
Adam Koblentz, field CTO at Reveal Security, discusses monitoring anomalous behavior of users, understanding threat actors in networks, and the role of AI-based tools. They highlight the importance of context in anomaly detection, tracking past activities, and strong multifactor authentication. The chapter emphasizes the significance of anomaly detection and user profiling, with a mention of sponsor Reveal Security as a helpful resource.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Sequential Inbox Reading Revealed A Takeover

  • A crime group logged in after victims left, forwarded MFA codes, and read emails sequentially for financial data.
  • That behavior stood out because humans rarely read an inbox item-by-item for hours.
ADVICE

Verify Suspicious Actions Via Trusted Channels

  • Use an automated, trusted channel to verify suspicious actions with the user before taking harsh remediation.
  • Ask simple yes/no confirmations (e.g., via Slack) to quickly triage intent.
INSIGHT

Digital Twins Require Longitudinal Detection

  • Attackers can create highly convincing digital twins that mimic legitimate users.
  • Detecting them requires longitudinal behavioral comparison, not single-point checks.
Get the Snipd Podcast app to discover more snips from this episode
Get the app