Suspicious app access
This detection is recorded when ITP detects an attacker's attempts to harvest app (service provider) session cookies.
Detection risk level: Medium
This is an indicator of a session hijacking attack. A common example is when a bad actor steals a user's Okta session cookie and uses it to rapidly access multiple apps. This is a high-priority investigation, even though the risk level is Medium. It implies an active, authenticated session.
Policy configuration
- Detection: Suspicious App Access
- Take this action: Run a Workflow to notify the SOC team to begin an investigation
Remediation strategy
-
Investigate: Look in the System Log for the app access events. Check to see if the IP address or user agent matches the user's other legitimate sessions.
-
Secure the account:
-
Go to the user's profile in the Admin Console.
-
Click Clear User Sessions to invalidate the stolen cookie and log out the attacker.
-
Contact the user to determine if their session may have been compromised (for example, malware on their device, phishing attack).
-
Scan the user's device for malware.
-
