Analytics Story: Remote Employment Fraud
Description
Fortify your insider threat monitoring with searches that monitor for and help you investigate possible remote employment fraud.
Why it matters
Remote employment fraud involves threat actors posing as job seekers or employers to gain unauthorized access to organizations, often using fake or stolen identities. This can result in insider threats, data breaches, financial loss, and reputational damage, as attackers exploit remote onboarding processes to infiltrate systems or harvest sensitive information. Strong identity verification, background checks, and ongoing monitoring are critical to mitigating these risks.
Detections
Name | Technique | Type |
---|---|---|
Zoom High Video Latency | Valid Accounts | Anomaly |
Zoom Rare Audio Devices | Audio Capture | Hunting |
Zoom Rare Input Devices | Audio Capture | Hunting |
Zoom Rare Video Devices | Audio Capture | Hunting |
Geographic Improbable Location | Valid Accounts | Anomaly |
Okta Non-Standard VPN Usage | Valid Accounts, Protocol Tunneling, Proxy | TTP |
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
Okta | N/A | OktaIM2:log |
Okta |
References
Source: GitHub | Version: 1