Skip to main content

AD_4nXdNjhbPtOJAbwAS_4qZqg-n9Kl0eQ8Y9-L1F1raAKqw8n48cjfnPdyGqFUsb7hfP2SND0n0J2S2T4D1MKcW0w-mPtDvwP7WPlBa06Gtm5hyJ6bMn6Yb8NLK6BcsYezw28otJs3FNcfk2weKNJ5CWiRfG8S6?key=bLISrItc3ck2GHz6YefCDg

Netskope Global Technical Success (GTS)

UEBA: Compromised Credential Incident Analysis

 

Netskope Cloud Version - 125

 

Objective

UEBA - Compromised Credential Incident Analysis

 

Prerequisite

Netskope UEBA/UBA license is required

 

Context

A detailed explanation of how Netskope's Compromised Credentials feature works.

Netskope Official Document - Link

 

Analysis

Path: Netskope Tenant UI >>> Incidents >>> Compromised Credentials

Ref. Image

AD_4nXesG6jTpp0dDgQr8H2Qt53KFqAI3mOiuJkwwDDGPPpyIBxMsLiwPStyGMfdA_p7h2GI0dQ_ZXtIZHtS_5MFiYPBcZ-mnUV-PPE5YtXAaYiAGilXty8Ued6QUkEbGLn-DR-0bO4koQ?key=bLISrItc3ck2GHz6YefCDg

 

  1. User - peter.johnson@abc.com

This is the official email ID of the end-user for whom the Compromised Credential alert was triggered.

  1. Matched User - pjohnson@gmail.com

This is the personal Email ID of the end-user for whom the Compromised Credential alert was triggered.

  1. Access Method - Client

The end-user was steering traffic to Netskope via Client (Netskope Client) when the compromised credential alert was triggered.

  1. Source of Info - XSS: grayscale.com Breach (523483 Records)

Based on information from XSS: grayscale.com Breach (523483 Records), the account details linked to the email address pjohnson@gmail.com were compromised and exposed on the dark web on April 30, 2025. Netskope does not possess details regarding the specific level of account information leaked, such as passwords, user personal details, etc.

  1. Application: Microsoft 365 Copilot

The application the user accessed that triggered the compromised credential detection.

  1. Activity: Browse

The activity the user performed that triggered the compromised credential detection.

  1. Incident ID: 459275175

compromised credential ID (Transaction ID)

  1. Activity Time: 

When the user performed the activity that triggered the compromised credential detection.

  1. Date Compromised - 4/30/2025

The date when XSS: grayscale.com Breach (523483 Records) released the leaked database was 4/30/2025.

  1. Timestamp - 5/7/2025 7:04 AM

The user utilized the email address pjohnson@gmail.com in a transaction on 5/7/2025 7:04 AM

 

  • Netskope's Compromised Credential (CC) engine collects information from various sources regarding leaked email data and stores it in a database.
  • This engine monitors every transaction, and if there's a match between a user's email ID used to log in to a web application and the database of leaked email data, Netskope generates a CC alert.
  • In the scenario provided, the user logged in with their Gmail ID, triggering a CC alert because of a match detected by Netskope's engines.
  • While matching with a Gmail ID is acceptable, there have been instances where employees registered for non-business applications using their official email IDs.
  • If you see a hit for domain @abc.com in the matched user section, please contact the end-user and advise them to update their account passwords.

 

Recommendations

It's important to educate end-users about the risks associated with using official email addresses for non-sanctioned or non-business applications. Netskope recommends implementing the following security measures:

  • Avoid Using Official Email Addresses: Encourage users not to create accounts on non-sanctioned or non-business applications using their official email addresses. Using personal email addresses for such purposes helps mitigate security risks.
  • Enable Multi-Factor Authentication (MFA): Ensure that all business applications are enabled with multi-factor authentication (MFA). MFA adds an extra layer of security by requiring users to provide additional authentication factors, such as a code sent to their mobile device, in addition to their password.
  • Implement Password Update Policy: Enforce a password update policy to ensure that users regularly update their account passwords. This helps prevent unauthorized access in case of compromised credentials.

By following these recommendations, organizations can enhance their security posture and reduce the risk of unauthorized access to business applications.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, If any such platform changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

What to Read Next?

UEBA: Compromised Credentials - General Q/A Link
UEBA: Compromised Credentials - Q/A attached to Email Notification Link
UEBA: Shared Credentials Incident Analysis Link

 

Be the first to reply!