<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Anomaly-Detection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/anomaly-detection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 13:35:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/anomaly-detection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual City for Azure Activity Logs Event</title><link>https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</link><pubDate>Thu, 02 Apr 2026 13:35:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</guid><description>A machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.</description><content:encoded><![CDATA[<p>This detection identifies Azure Activity Logs activity originating from a city that is atypical for the specific event action being performed. The underlying mechanism is a machine learning job, <code>azure_activitylogs_rare_event_action_for_a_city_ea</code>, designed to surface anomalous geolocation patterns. The rule is triggered when the anomaly score exceeds 50. Such deviations can indicate compromised credentials used by an attacker operating from a different geography than the authorized user. This activity can be an early indicator of account abuse, potentially preceding broader impact such as data exfiltration or resource exploitation. The rule is designed to be used with Elastic Stack version 9.4.0 and later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains valid Azure credentials (username/password or service principal keys) through phishing, credential stuffing, or other means.</li>
<li><strong>Initial Access:</strong> The attacker uses the compromised credentials to log in to the Azure environment from an unusual geographic location (city).</li>
<li><strong>Activity Log Generation:</strong> The login and subsequent actions generate Azure Activity Logs entries.</li>
<li><strong>Resource Access/Modification:</strong> The attacker performs actions such as adding privileged role assignments, creating virtual machines, modifying network configurations, or accessing Key Vault secrets.</li>
<li><strong>Lateral Movement (Potential):</strong> The attacker may use the initially compromised account to discover and access other resources or accounts within the Azure environment.</li>
<li><strong>Data Exfiltration/Resource Exploitation (Potential):</strong> The attacker exfiltrates sensitive data or uses compromised resources for malicious purposes like cryptocurrency mining.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, modification of critical infrastructure, and deployment of malicious resources within the Azure environment. The impact can range from data breaches and financial losses to disruption of services. While the risk score of this detection is low, further investigation is required to determine the extent and nature of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the associated Machine Learning job (<code>azure_activitylogs_rare_event_action_for_a_city_ea</code>) and ensure that the Azure Activity Logs integration is properly configured to provide the necessary data.</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> field to understand possible investigation steps, including validating user presence in the region and enriching the source IP.</li>
<li>Implement response and remediation steps outlined in the rule <code>note</code> field such as revoking active sessions, resetting passwords, and reverting changes executed from the unusual city.</li>
<li>Configure Conditional Access policies with country allowlists and named egress IP ranges, as recommended in the rule&rsquo;s <code>note</code> field, to prevent logins from unexpected locations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>anomaly-detection</category></item><item><title>Unusual Host Name for Windows Privileged Operations Detected via ML</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-unusual-windows-privileged-access/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-unusual-windows-privileged-access/</guid><description>A machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.</description><content:encoded><![CDATA[<p>This threat brief describes the detection of unusual privileged access activity in Windows environments. The detection leverages a machine learning model (&ldquo;pad_windows_rare_device_by_user_ea&rdquo;) designed to identify deviations from typical host usage patterns. Specifically, it flags instances where a user performs privileged operations from a device not commonly associated with that user. This activity can indicate a compromised account where an attacker is using stolen credentials or an insider threat attempting to escalate privileges from an unauthorized device. The detection is part of the Elastic Privileged Access Detection (PAD) integration and focuses on Windows events collected by Elastic Defend and Windows integrations. The PAD integration requires Fleet and properly configured agents. The anomaly_threshold is set to 75.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a valid user account, potentially through phishing, credential stuffing, or other means.</li>
<li>The attacker logs into a Windows system using the compromised account from a device that is not typically used by that user.</li>
<li>The attacker attempts to execute privileged operations on the system, such as installing software, modifying system settings, or accessing sensitive data.</li>
<li>Windows logs capture the privileged operations being performed by the user account from the unusual device.</li>
<li>The Elastic Privileged Access Detection (PAD) integration analyzes the logs using its machine learning model (&ldquo;pad_windows_rare_device_by_user_ea&rdquo;).</li>
<li>The ML model identifies the activity as anomalous based on the rarity of the device being used by the user for privileged operations.</li>
<li>A detection rule triggers, flagging the unusual activity as a potential privileged access attempt.</li>
<li>The security team investigates to determine whether the activity is malicious or a legitimate use case (e.g., user working from a new device).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to privilege escalation, allowing the attacker to gain control of the system and potentially the entire network. This can result in data breaches, system compromise, and disruption of services. The severity is rated as low because the detection relies on anomalies and requires further investigation to confirm malicious intent. Identifying unusual access patterns early can prevent more severe incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration is installed and properly configured, including the preconfigured anomaly detection jobs, as outlined in the <a href="#setup">setup instructions</a>.</li>
<li>Investigate alerts generated by the &ldquo;Unusual Host Name for Windows Privileged Operations Detected&rdquo; rule, focusing on the specific user and host involved, per the <a href="#triage-and-analysis">investigation guide</a>.</li>
<li>Implement multi-factor authentication (MFA) for privileged accounts to mitigate the risk of unauthorized access even if credentials are compromised, as mentioned in the <a href="#response-and-remediation">response and remediation</a> section.</li>
<li>Review and update access controls and permissions to ensure that only authorized devices and users can perform privileged operations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>anomaly-detection</category><category>windows</category></item></channel></rss>