Exaforce Author Keith Buswell
Customer Story
September 3, 2025

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

Keith Buswell

Keith Buswell

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

In the cat-and-mouse game of identity protection, attackers are playing the long game, probing, rotating infrastructure, and waiting for a weak link. At Exaforce, we protect many high-profile companies in sensitive industries that are constant targets of identity attacks. This blog post walks through a real compromise that unfolded recently with a current customer across several weeks, involving dozens of international IP addresses, eventual credential theft, and multiple successful authentications.

We’re sharing this timeline to show how persistent attackers really operate, and how visibility, context, and behavioral signal correlation are essential in detecting and stopping identity-based attacks.

Executive Summary

Attack Duration: May 15 - June 25, 2025
Initial Vector:
Brute-force login attempts to SaaS authentication portals
Infrastructure:
200+ IPs across 40+ countries, many with ASN anomalies
Exaforce Detections:
Impossible travel, ASN mismatch, repeated policy evaluations
Outcome:
Attacker obtained valid credentials and successfully authenticated multiple times before remediation
Remediation: Forced logout of all active sessions, password reset, account enrolled in MFA

The anatomy of the attack

Phase 1: Reconnaissance and testing (May 15 - June 5)

The first signals were subtle: a handful of failed authentication attempts from Switzerland, France, the USA, and Morocco. Over the next three weeks, the volume increased steadily. All were unsuccessful, but the geography, ASN mismatches, and repeated attempts on a few accounts hinted at a coordinated brute-force effort, most notably repeated failures from IPs tied to Beltelecom (BY), Bahnhof AB (SE), and Novotelecom (RU).

Exaforce events table showing Okta authentication logs with success and failure results across global IP addresses
Initial low volume probing with multiple failed login attempts from different locations

Despite the failures, the persistent attempts clearly showed this was a targeted attack that wouldn’t stop.

Phase 2: Coordinated spread (June 25)

The volume of activity spiked. Over 80 sign-on events were logged from a rotating set of international IPs. Key red flags:

  • Multiple successful logins from IPs with no prior history in the environment
  • Sign-ons from ASNs not aligned with user locations (e.g., AS29069 - Rostelecom)
  • Location anomalies and ASN anomalies flagged across accounts, including admin identities
Exaforce events table showing Okta sign-in logs with success and allow results from multiple global IP addresses
Location and ASN anomalies detected by Exaforce

Attacker infrastructure profile

Over the course of the incident, Exaforce identified authentication attempts from more than 200 unique IP addresses across 40+ countries, involving both failed and successful logins. This diverse infrastructure is a hallmark of modern credential-based attacks and highlights the importance of geographic anomaly detection.

Some compelling stats from the investigation:

  • Top Attacker Countries: Sweden, Romania, Norway, Ukraine, Tunisia, Russia, Spain, Netherlands, United Arab Emirates, Germany
  • Most Active IPs (by authentication attempt volume):
    • 41.224.62.206 (ORANGE – Tunisia): 166 attempts
    • 89.160.38.13 (Bredband2 AB – Sweden): 165 attempts
    • 176.104.241.131 (Bilink LLC – Ukraine): 155 attempts
    • 109.100.41.198 (Orange Romania – Romania): 153 attempts
    • 89.10.140.58 (NextGenTel AS – Norway): 151 attempts
Bar chart of authentication events by day showing counts of allow, failure, and success results on a log scale
Chart showing authentications by day and the spikes in failed attempts
  • Widespread ASN Usage: Attackers utilized dozens of unique ASNs, including major ISPs, hosting providers, and anonymizing infrastructure like DigitalOcean and netcup GmbH, further complicating attribution and blocking.
  • Repeated Patterns: Many IPs were used in short bursts, mimicking spray-and-pray behavior, while others established persistence with multiple successful logins over several days.

These findings reinforce the need for automated correlation of IP geolocation, ASN anomalies, and login behavior, capabilities that were instrumental in surfacing this attack as soon as the customer connected their Okta logs.

How Exaforce detected the incident

Exaforce was able to detect the intrusion the day it occurred (June 25). Detection wasn’t based on a single indicator. Exaforce's AI automatically stitched together multiple signals to arrive at a single threat finding. No rules written, no manual correlation performed.

  • Impossible travel violations (e.g., logins from Sweden and Tunisia minutes apart)
  • ASN anomaly detections from Okta policy evaluations
  • Success/failure ratios on previously clean accounts
  • Alert correlation across devices, IPs, and session behaviors
Exaforce threat finding showing multiple location anomalies and ASN changes across 20+ countries
Exaforce threat finding with an easy to digest summary of the signals and a detailed breakdown with recommended next steps.

After detecting the intrusion, the customer was able to contain the threat by force logging out of all active sessions, resetting all passwords for the account, and enrolling the account in MFA to prevent another future breach.

 Key lessons for defenders

Table mapping security findings like brute-force or MFA abuse to defensive recommendations such as velocity-based detection

How Exaforce helps

This incident was identified, investigated, and responded to inside our platform using:

  • Account timeline stitching to correlate activity across time and surfaces for clearer attack progression.
  • ASN-aware policy evaluations to detect access from risky or unusual networks more accurately.
  • Visual behavioral analytics to help analysts quickly verify anomalies and patterns in user or system behavior.
  • Alert summarization across IP clusters to highlight coordinated or related activity.
  • Detailed remediation guidance to enable faster, more effective response without relying on external expertise.

Beyond just alert triage with full detection and context

When this customer connected their Okta tenant to Exaforce during onboarding, our platform immediately began behavioral analytics across identity, geo, ASN, and policy telemetry. Without custom rules, Exaforce detected a high-risk pattern: an admin-privileged service account signing in to Microsoft 365 from 40+ countries and 37+ distinct ASNs in compressed time windows - classic impossible travel plus infrastructure rotation.

Exaforce then auto-generated the finding, triaged it, and enriched it with analyst-ready context: why it matters (admin account, sensitive operations), what was observed (global spread, no matching safe VPN IPs), mapped MITRE tactic/technique (Initial Access → Valid Accounts), confidence level (High), and recommended investigation priority. All of the evidence, IP intelligence, event counts, and MFA-related actions were packaged in a single view, exportable as audit data or JSON.

The result: instead of starting from raw Okta logs and writing queries, the security team started from a high-confidence, fully scoped account-takeover investigation. This is the difference between alert noise and operational detection.

Want to see what Exaforce can do with your IdP data? We can show you what’s hiding in the data you already have. Schedule a demo to find out more.

Recent posts

7 predictions for the security landscape in 2026

7 predictions for the security landscape in 2026

Exaforce Agentic SOC 2025 year in review

Exaforce Agentic SOC 2025 year in review

When trusted third parties behave like threat actors

When trusted third parties behave like threat actors

Lessons from the hallways at my first AWS re:Invent

Lessons from the hallways at my first AWS re:Invent

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

How an AI SOC turns Anthropic’s intelligence report into daily defense

How an AI SOC turns Anthropic’s intelligence report into daily defense

Your AI-driven threat hunting is only as good as your data platform and pipeline

Your AI-driven threat hunting is only as good as your data platform and pipeline

The log rings don’t lie: historical enumeration in plain sight

The log rings don’t lie: historical enumeration in plain sight

The past, present, and future of security detections

The past, present, and future of security detections

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

GPT needs to be rewired for security

GPT needs to be rewired for security

Aggregation redefined: Reducing noise, enhancing context

Aggregation redefined: Reducing noise, enhancing context

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

How agentic AI simplifies GuardDuty incident response playbook execution

How agentic AI simplifies GuardDuty incident response playbook execution

There’s a snake in my package! How attackers are going from code to coin

There’s a snake in my package! How attackers are going from code to coin

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

s1ngularity supply chain attack: What happened & how Exaforce protected customers

s1ngularity supply chain attack: What happened & how Exaforce protected customers

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Meet Exaforce: The full-lifecycle AI SOC platform

Meet Exaforce: The full-lifecycle AI SOC platform

Building trust at Exaforce: Our journey through security and compliance

Building trust at Exaforce: Our journey through security and compliance

Fixing the broken alert triage process with more signal and less noise

Fixing the broken alert triage process with more signal and less noise

Evaluate your AI SOC initiative

Evaluate your AI SOC initiative

One LLM does not an AI SOC make

One LLM does not an AI SOC make

Detections done right: Threat detections require more than just rules and anomaly detection

Detections done right: Threat detections require more than just rules and anomaly detection

The KiranaPro breach: A wake-up call for cloud threat monitoring

The KiranaPro breach: A wake-up call for cloud threat monitoring

3 points missing from agentic AI conversations at RSAC

3 points missing from agentic AI conversations at RSAC

5 reasons why security investigations are broken - and how Exaforce fixes them

5 reasons why security investigations are broken - and how Exaforce fixes them

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Npm provenance: bridging the missing security layer in JavaScript libraries

Npm provenance: bridging the missing security layer in JavaScript libraries

Exaforce’s response to the LottieFiles npm package compromise

Exaforce’s response to the LottieFiles npm package compromise

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you

Black Pattern Background