Skip to content
Threat Feed

Tag

Privileged-Access

8 briefs RSS
low advisory

Unusual Spike in Okta User Lifecycle Management Change Events

A machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.

privileged-access okta user-lifecycle
2r 4t
low advisory

Okta Group Lifecycle Change Spike Indicating Privilege Escalation

A machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.

privileged-access okta group-lifecycle
2r 4t
low advisory

Unusual Source IP for Okta Privileged Operations Detected

A machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.

privileged-access okta machine-learning
2r 3t
low advisory

Okta Group Application Assignment Spike Indicates Privilege Escalation

A machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.

privileged-access privilege-escalation okta
2r 4t
medium advisory

Enumeration of Privileged Local Groups Membership

An unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.

Windows discovery privileged-access
2r 1t
high advisory

Azure AD Privileged Role Assignment

Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.

Azure Active Directory azure privileged-access role-assignment
2r 2t
low advisory

Unusual Privilege Type Assigned to User via Machine Learning Anomaly

A machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.

privileged-access privilege-escalation windows
2r 4t
low advisory

Okta Group Membership Spike Detection

A machine learning job has identified an unusual spike in Okta group membership events, indicating potential privileged access activity where attackers or malicious insiders might be adding accounts to privileged groups to escalate their access, potentially leading to unauthorized actions or data breaches.

privileged-access privilege-escalation okta
2r 4t