Back to Blog
Exaforce
Customer Story
November 25, 2025

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Automated, context-aware detection caught a multi-vector Google Workspace account takeover in minutes.

On November 3, 2025, Exaforce detected a coordinated attempt to compromise a customer’s Google Workspace account. The sequence began with a failed login from a Budapest commercial proxy at 12:06 UTC and escalated hours later when a successful login originated from a Linode server in Chicago, while the user was simultaneously active from their normal Ashburn location.

Within minutes of that Chicago login, the attacker established persistence through standard account takeover actions. In scenarios like this, legacy rule-based tooling would struggle to stitch these signals together. Building a static rule capable of correlating proxy-based infrastructure, anomalous ASNs, impossible travel, reauth events, and rapid-fire sensitive changes would require highly complex logic and constant manual tuning. Exaforce eliminated that burden, automatically correlating signals that would otherwise take analysts hours to piece together.

We will outline the attack and how Exaforce’s agentic SOC platform identified, correlated, and ultimately helped disrupt this targeted attack.

Executive Summary

Attack Window: November 3, 2025 (12:06 - 18:11 UTC)

Initial Vector: Failed login from a commercial proxy exit node

Infrastructure: Multiple commercial proxy services (IPRoyal, MarsProxies, NodeMaven, ProxySeller, Webshare) and a Linode cloud server

Exaforce Detections: Impossible travel, anomalous ASN, unfamiliar IP infrastructure, Sensitive Action Performed

Outcome: Attacker successfully authenticated twice, changed recovery email, and reset the account password

User Baseline: Normal activity originates from Ashburn and Amsterdam, none matching Chicago or Budapest, where the attacks originated

Remediation: Temporary account deactivation while the customer completes their investigation.

The anatomy of the attack

1. Initial reconnaissance & failed access attempt

12:06 UTC - Budapest (Commercial proxy)

The first sign of malicious activity came from a failed login attempt originating from a commercial proxy exit node in Budapest. The infrastructure used is associated with multiple proxy services, indicating the attacker was masking their true location. No access was gained at this stage.

Detected failed login attempt based on impossible travel

2. Attacker regroups and acquires valid credentials

12:06-17:39 UTC - 5.5 hours of silence

Following the failed login, the attacker paused activity. This window is consistent with credential-harvesting techniques, likely involving a phishing lure designed to capture the victim’s Google Workspace password.

3. Unauthorized access achieved

17:39 UTC - Chicago (Linode cloud server)

The attacker successfully authenticated using a Linode cloud server in Chicago while the legitimate user was active in Ashburn. This created a clear impossible-travel scenario and marked the moment initial access was achieved. Exaforce’s automated correlation elevated this immediately; in contrast, legacy tools would have required manual rule chaining or analyst investigation to connect the disparate geography, ASN, and infrastructure anomalies.

Successful login detected due to the impossible travel

This successful authentication raised the highest severity signal, recorded as a “reauth” login from a VPN exit node, suggesting the attacker possessed valid session credentials and had fully taken over the account.

Details of the failed login attempt

4. Establishing persistence

17:43 UTC - Recovery email changed

The attacker immediately modified the account’s recovery email, redirecting account-reset flows to an inbox they controlled.

17:45 UTC - Password changed

Two minutes later, the account password was reset. At this point, the attacker had fully locked the legitimate user out of their Google Workspace account.

Time to full takeover: 6 minutes

Successful login attempts and password change by the bad actor

6. Continued access using rotating proxy infrastructure

18:11 UTC - Budapest (second proxy)

Roughly 30 minutes after the takeover, the attacker authenticated again, this time from a different Budapest proxy service. This confirmed that the newly set password was in use and demonstrated deliberate rotation of anonymized infrastructure, another scenario that typically evades single-event rules in legacy tools.

7. Duration of exposure & potential impact

From 17:39-18:11 UTC, the attacker operated with access across the user’s Gmail, Drive, contacts, calendar, SaaS integrations, and OAuth-connected services. The depth of data exposure or manipulation during this period is currently being investigated.

8. Current status & response

The account has been contained, and several response steps are now underway. The account was temporarily suspended to prevent any further activity. Out-of-band verification with the user is being conducted to confirm legitimate ownership. Administrators are reviewing email-forwarding rules, OAuth tokens, and Drive activity to identify any persistence mechanisms or data access. A supervised password and MFA reset is being performed to restore secure authentication. Finally, all actions performed during the unauthorized session are under investigation to determine the full scope of impact.

Response & remediation

Investigation and customer notification

Upon detection of the critical account modifications, Exaforce's MDR analyst immediately began investigating the correlated signals. The platform’s automated detection and enrichment capabilities produced a comprehensive evidence package within minutes, accelerating human analysis and allowing swift, targeted actions that limited the overall impact.

Lessons learned

This real-world account takeover demonstrates the critical importance of automated, context-aware security operations. The sophistication of modern attacks, combining proxy evasion, 2SV bypass, and rapid execution, demands equally sophisticated defense mechanisms.

Exaforce's automated detection identified the threat within minutes, correlated seemingly disparate signals into a coherent attack narrative, and executed containment before the attacker could establish persistent access or exfiltrate data, work that legacy tools would struggle to detect without extensive custom rule engineering. In an era where identity is the new perimeter, Exaforce provides the automated vigilance necessary to protect against even the most advanced account compromise attempts.

Table of contents

Share

Exaforce What is an AI SOC Anyway Webinar

Recent posts

Research

November 24, 2025

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

Industry

November 11, 2025

How an AI SOC turns Anthropic’s intelligence report into daily defense

Research

November 5, 2025

The log rings don’t lie: historical enumeration in plain sight

Product

October 29, 2025

The past, present, and future of security detections

Exaforce HITRUST award

Product

October 16, 2025

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

Exaforce Blog Featured Image

Industry

October 9, 2025

GPT needs to be rewired for security

Exaforce Blog Featured Image

Product

October 8, 2025

Aggregation redefined: Reducing noise, enhancing context

Exaforce Blog Featured Image

News

Product

October 7, 2025

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Exaforce Blog Featured Image

Research

October 2, 2025

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Exaforce Blog Featured Image

News

September 25, 2025

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

Exaforce Blog Featured Image

Industry

September 24, 2025

How agentic AI simplifies GuardDuty incident response playbook execution

Exaforce Blog Featured Image

Research

September 10, 2025

There’s a snake in my package! How attackers are going from code to coin

Exaforce Blog Featured Image

Research

September 9, 2025

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Exaforce Blog Featured Image

Customer Story

September 3, 2025

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

Exaforce Blog Featured Image

Industry

August 27, 2025

s1ngularity supply chain attack: What happened & how Exaforce protected customers

Exaforce Blog Featured Image

Product

News

August 26, 2025

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Exaforce Blog Featured Image

News

Product

August 26, 2025

Meet Exaforce: The full-lifecycle AI SOC platform

Exaforce Blog Featured Image

Product

August 21, 2025

Building trust at Exaforce: Our journey through security and compliance

Exaforce Blog Featured Image

Industry

August 7, 2025

Fixing the broken alert triage process with more signal and less noise

Exaforce Blog Featured Image

Product

July 16, 2025

Evaluate your AI SOC initiative

Exaforce Blog Featured Image

Industry

July 10, 2025

One LLM does not an AI SOC make

Exaforce Blog Featured Image

Industry

June 24, 2025

Detections done right: Threat detections require more than just rules and anomaly detection

Exaforce Blog Featured Image

Industry

June 10, 2025

The KiranaPro breach: A wake-up call for cloud threat monitoring

Exaforce Blog Featured Image

Industry

May 29, 2025

3 points missing from agentic AI conversations at RSAC

Exaforce Blog Featured Image

Product

May 27, 2025

5 reasons why security investigations are broken - and how Exaforce fixes them

Exaforce Blog Featured Image

Product

May 7, 2025

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Exaforce Blog Featured Image

News

Product

April 17, 2025

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Exaforce Blog Featured Image

Industry

March 16, 2025

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Exaforce Blog Featured Image

Industry

November 6, 2024

Npm provenance: bridging the missing security layer in JavaScript libraries

Exaforce Blog Featured Image

Industry

November 1, 2024

Exaforce’s response to the LottieFiles npm package compromise

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you