Cloud SecurityDevice & IoTPress ReleaseThreat Detection & Defense

Barracuda’s AI Pattern Analysis Thwarts Account Abuse Attempts

Barracuda Networks, a leading provider of cloud-first security solutions has unveiled the findings of the first half of 2023 as AI-based pattern analysis helped Barracuda Managed XDR to detect and neutralise thousands of high-risk incidents in nearly one trillion IT events collected overall.

The three most common high-risk detections were “impossible travel” login detections, “anomaly” detection and “communication with known malicious artefacts” – defined as threats that required immediate defensive actions during the first six months of 2023.

“Impossible travel” login detections occur when a user is trying to log into a cloud account from two geographically different locations in rapid succession – with the distance between them impossible to cover in the time between logins. While this can mean they are using a VPN for one of the sessions, it is often a sign that an attacker has gained access to a user’s account.

“In one incident investigated by the SOC team, a user logged into their Microsoft 365 account from California, and then just thirteen minutes later from Virginia,” said Merium Khalid, Director, SOC Offensive Security, Barracuda.

“To physically achieve this, they would have to travel at a speed exceeding 10,000 miles per hour. The IP used to log in from Virginia was not associated with a known VPN address and the user did not normally log in from this location. We notified the customer who confirmed that this was an unauthorized login immediately reset their passwords and logged the rogue user out of all active accounts.”

“Anomaly” detections identify unusual or unexpected activity in a user’s account. This could include things like rare or one-off login times, unusual file access patterns, or excessive account creation for an individual user or organization. Such detections can be a sign of a variety of problems, including malware infections, phishing attacks, and insider threats.

Communication with known malicious artefacts, identify communication with red flagged or known malicious IP addresses, domains, or files. This can be a sign of a malware infection or a phishing attack and you should immediately quarantine the computer.

“Everyone has a distinctive digital profile in terms of how, where and when they work. If an IT event falls outside these pattern perimeters the AI-based detection triggers an alert,” added Khalid.

However, while AI can significantly enhance security, it can also be used for malicious purposes – to create highly convincing emails or adapt malicious code to specific targets or changing security conditions, for example. For Asia-Pacific businesses to secure their organisation and employees against these rapidly evolving, increasingly intelligent attack tactics, they need deep, multi-layered security that includes robust authentication measures, regular employee training and software updates, underpinned by full visibility and continuous monitoring across the network, applications, and endpoints.”

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *