<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Impossible-Travel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/impossible-travel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/impossible-travel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Impossible Travel Detection in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</guid><description>This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.</description><content:encoded><![CDATA[<p>This rule detects &ldquo;impossible travel&rdquo; events within Azure Active Directory (Azure AD), a common indicator of account compromise. The scenario involves a user account exhibiting login activity from two geographically distant locations in a timeframe that makes physical travel between them impossible. This anomalous behavior often signifies that an attacker has gained unauthorized access to the account and is operating from a different location than the legitimate user. The rule leverages Azure AD Identity Protection&rsquo;s risk detection capabilities to identify such instances. This detection is crucial for defenders as it highlights potential breaches and enables swift remediation actions to prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials, potentially through phishing (T1566), credential stuffing, or malware.</li>
<li>The attacker authenticates to Azure AD from a geographic location different from the legitimate user&rsquo;s typical location.</li>
<li>Shortly after the initial authentication, the legitimate user authenticates to Azure AD from their usual location.</li>
<li>Azure AD Identity Protection flags the activity as &ldquo;impossible travel&rdquo; due to the conflicting geographic locations and the short timeframe between the authentications.</li>
<li>The &ldquo;impossibleTravel&rdquo; risk event is logged within Azure AD&rsquo;s risk detection logs.</li>
<li>The attacker may attempt to escalate privileges within the compromised account (T1068) to gain broader access to resources.</li>
<li>The attacker may move laterally within the organization (T1021) to access sensitive data or systems.</li>
<li>The attacker&rsquo;s ultimate goal could be data exfiltration, financial theft, or disruption of services, depending on the organization&rsquo;s profile.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful &ldquo;impossible travel&rdquo; attack can lead to a full compromise of the user&rsquo;s account, granting the attacker access to sensitive data, internal systems, and other resources accessible to the user. Depending on the user&rsquo;s role and permissions, the impact could range from data breaches to financial losses and significant reputational damage. Organizations in all sectors are vulnerable, with a higher risk for those handling sensitive data or operating critical infrastructure. The number of affected users depends on the attacker&rsquo;s ability to move laterally and escalate privileges after compromising the initial account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;impossible travel&rdquo; events flagged by Azure AD Identity Protection, focusing on the <code>riskEventType: 'impossibleTravel'</code> (logsource: azure, service: riskdetection).</li>
<li>Investigate any triggered alerts promptly, focusing on the user account involved and the geographic locations of the login attempts (logsource: azure, service: riskdetection).</li>
<li>Review and enhance user training programs to educate employees on the risks of phishing and credential compromise (T1566).</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of unauthorized access even if credentials are compromised (T1110).</li>
<li>Review and adjust the sensitivity of Azure AD Identity Protection&rsquo;s risk detection policies to align with your organization&rsquo;s risk tolerance.</li>
<li>Consider implementing conditional access policies that restrict access based on geographic location or require MFA for logins from unfamiliar locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>identity-protection</category><category>impossible-travel</category><category>account-compromise</category><category>lateral-movement</category></item></channel></rss>