Command Zero
Narration by Agent Zero
Highrun-1a522460-012b-4fa5-9476-e9eca2ada99a
True Positive - Blocked
High confidence
  • account-compromise
  • mfa-bypass
  • conditional-access
  • sspr-abuse
  • credential-theft
  • identity-protection

Account Takeover Attempt Blocked: Multi-Country Attack with SSPR Abuse

An attacker conducted a coordinated account takeover campaign against a Honduras-based employee, successfully passing MFA to unlock the account twice via self-service password reset but failing to change the password or sign in due to Conditional Access policies and password complexity controls.

AUTONOMOUS INVESTIGATIONCommand Zero · Agent Zero
4m 27s
INVESTIGATION TIME
Autonomous
28
QUESTIONS ASKED
HAVEIBEENPWNED, IPDATA, MICROSOFT 365 DEFENDER, MICROSOFT ENTRA
149
RECORDS ANALYZED
Across all data sources
~4 hrs
HUMAN ANALYSIS
Tier-2 equivalent *
~$303
ANALYST COST SAVED
At $85/hr loaded rate *

Time and cost estimates are based on a Tier-2 SOC analyst model and actual investigation telemetry. Individual results vary by analyst experience, tooling, and environment.

Initial Signal

On March 23, 2026, Microsoft Entra ID flagged user_1@[INTERNAL_DOMAIN_1].com, a Customer Experience Agent based in Honduras, as high-risk after detecting a coordinated account takeover campaign. The alert mapped to T1078 (Valid Accounts) and T1556 (Modify Authentication Process) attack patterns. Between March 22-23, the account exhibited geographically impossible sign-in attempts from Bangladesh (via a VPN with score 99), Malaysia, Spain, Philippines, and Mexico—all within 21 hours. The attacker successfully authenticated using SMS-based MFA to unlock the account twice from Honduras ISP IPs (186.2.128.x), then attempted to reset the password four times using weak passwords that violated the organization's complexity policy. All five high-risk sign-in attempts to Azure Portal and My Signins (MFA management portal) were blocked by Conditional Access policies with error codes 53003 and 53004. The investigation correlated 82 sign-in records, 44 directory audit events, and IPData enrichment across four data sources in 4m 27s, revealing a sustained attack that was contained by policy enforcement but exposed a critical gap: the attacker's ability to pass MFA verification during self-service account recovery.

The Questions We Asked

What follows is the path the agent walked to reach its verdict. Pivots and dead ends both made the cut. Routine steps that just ruled out the obvious are grouped together so you can skim past them.

Q1

Did anyone already triage this?

Negative finding
Supporting Evidence
No analyst notes explain this activity as requiring no further action or as being authorized/expected
High
Conclusion:Not Documented as Benign·Documented as Requiring No Action
Q2

Could this be normal work?

Pivot
What sign-in activity exists in Microsoft Entra ID for this user? (Microsoft Beta Sign Ins)82 records
Supporting Evidence
Five separate sign-in attempts from 5 different countries (Bangladesh, Malaysia, Spain, Philippines, Mexico) all flagged as atRisk on the same day, none consistent with a user based in Honduras performing normal work
High
Supporting Evidence
Account was unlocked twice via SSPR from Honduras IP [EXTERNAL_IP_2] (Mar 22), then a password reset was attempted 4 times and failed from different Honduras IP [EXTERNAL_IP_6] (Mar 23) — behavior consistent with an attacker who successfully unlocked the account but tried and failed to reset the password
High
Supporting Evidence
IP [EXTERNAL_IP_1] (Bangladesh) is classified as a VPN with vpn_score of 99 by IPData, suggesting deliberate IP masking — inconsistent with normal user activity
High
Conflicting Evidence Resolved
User is based in [SITE_1], Honduras, which could explain sign-ins from Honduras IPs (186.2.128.x) as normal for this user's location
Moderate
Conclusion:Deviates from Normal Operations·Aligns with Normal Business Operations
Q3

Is this outside their job scope?

Pivot
What sign-in activity exists in Microsoft Entra ID for this user? (Microsoft Beta Sign Ins)82 records
Supporting Evidence
Sign-in attempts flagged as 'atRisk' originated from Bangladesh (BD), Malaysia (MY), Spain (ES), Philippines (PH), and Mexico (MX) — none of these countries are consistent with the expected scope of a Customer Experience Agent based in Honduras
High
Supporting Evidence
Two successful self-service account unlocks from Honduras IP [EXTERNAL_IP_2], followed by rapid-fire failed sign-in attempts and a subsequent password reset attempt, is not within the expected scope of a Customer Experience Agent's normal activities
High
Supporting Evidence
The triggering sign-in came from a Bangladesh VPN IP (VPN score 99), which is completely outside the expected access scope for a Honduras-based Customer Experience Agent
High
Conflicting Evidence Resolved
User is a Customer Experience Agent based in Honduras; some activity from Honduras IPs could fall within role expectations
Low
Conclusion:Outside Expected Role Scope·Within Expected Role Scope
Q4-Q7

Four checks, mostly ruling out benign explanations.

Supporting Evidence
The risky sign-in attempts targeted Azure Portal, My Signins (MFA management app), and [CUSTOM_APP_1] from countries outside Honduras — accessing identity management and admin portals from globally distributed suspicious IPs is not consistent with core customer service agent responsibilities
High
Conclusions:Data Access Exceeds Role·Not Explained by Legitimate Operations·Not Benign User Error·Attempted Policy Violation
Q8

Did anything actually stop it?

Pivot
What sign-in activity exists in Microsoft Entra ID for this user? (Microsoft Beta Sign Ins)82 records
Supporting Evidence
All 5 risky sign-in attempts from foreign countries were blocked (all failures) — Conditional Access policies successfully prevented unauthorized access
High
Supporting Evidence
The Bangladesh sign-in was blocked by CA policy '[CA_POLICY_1]' — security controls successfully prevented access
Confirmed
Supporting Evidence
All 4 password reset attempts from Honduras IP [EXTERNAL_IP_6] failed due to password policy enforcement, preventing the attacker from changing the password
High
Conflicting Evidence Resolved
Two successful account unlocks via SSPR from Honduras IP [EXTERNAL_IP_2] indicate some malicious actions did succeed — the attacker passed MFA verification to unlock the account
Moderate
Conclusion:Security Controls Blocked Violation·Security Controls Did Not Block
Q9

Do we have enough to call it?

Ruled out
What sign-in activity exists in Microsoft Entra ID for this user? (Microsoft Beta Sign Ins)82 records
Supporting Evidence
None of the 5 risky (atRisk) sign-in attempts showed 'Correct password' as an authentication step result — the attacker never validated a correct password during the blocked attack attempts
Confirmed
Supporting Evidence
The triggering Bangladesh sign-in used SMS Sign-in and was blocked by CA before any password validation could occur. The blocked activity did not involve interactive password-based authentication at all.
Confirmed
Conclusion:Attacker Does Not Have Password·Attacker Has Correct Password

Key Pivots

Detection Opportunities

The high-fidelity detection signals from this investigation, sanitized for general use. Each MITRE ID links to the official technique reference.

Unfamiliar sign-in propertiesSelf-Service Password Reset AbuseConditional Access Policy Block
TechniqueTacticContext
T1078
Valid Accounts
Initial AccessFlag sign-in attempts from geographically impossible locations within 24 hours (e.g., Honduras to Bangladesh to Malaysia to Spain to Philippines to Mexico). Alert on any single user account generating atRisk sign-ins from five or more distinct countries in a 24-hour window. Correlate IP geolocation with VPN detection scores; IPs with vpn_score >= 90 attempting access to administrative portals (Azure Portal, MFA management) should trigger immediate investigation.
T1556.001
Modify Authentication Process: Change Authentication Credentials
Defense EvasionMonitor for multiple failed password reset attempts (4+ in 24 hours) using weak or policy-violating passwords from the same IP address. Alert on successful account unlock operations via SSPR followed within 2 hours by failed sign-in attempts from different geographies. Track SSPR operations that succeed despite concurrent high-risk sign-in attempts from other IPs; this pattern indicates MFA compromise or SIM swapping.
T1078
Valid Accounts
Initial AccessEstablish baseline for CA policy blocks per user per day. Alert when a single user account triggers 5+ CA policy blocks (error codes 53003, 53004) within 24 hours, especially if blocks target administrative resources. Correlate blocked attempts with successful SSPR operations from different IPs to identify partial account compromise (attacker has MFA but not password).

Verdict Reasoning

The verdict of True Positive - Blocked at high confidence rests on the following mutually corroborating signals:

1. Five distinct risky sign-in attempts from geographically impossible locations (Bangladesh, Malaysia, Spain, Philippines, Mexico) all flagged as 'atRisk' by Microsoft Entra Identity Protection's ML models and blocked by Conditional Access policies with definitive error codes (53003, 53004)

2. Two successful self-service account unlocks from Honduras ISP IPs recorded in directory audit logs, proving the attacker passed MFA verification using the user's registered SMS method

3. Four failed password reset attempts from Honduras IP [EXTERNAL_IP_6] with error codes indicating password policy violations (OnPremisesPolicyViolation, FuzzyPolicyViolation), confirming the attacker could not change the password

4. IPData enrichment confirming the Bangladesh IP is a VPN (score 99) and the Honduras IPs are standard residential ISPs (proxy_score=0, vpn_score=0), ruling out organizational proxy false positives

5. No 'Correct password' authentication step recorded in any risky sign-in attempt, confirming the attacker does not have the correct password and relied on SMS-based MFA. Confidence is High rather than Confirmed because the Honduras SSPR activity could theoretically include some legitimate user behavior (the user is based in Honduras), though the pattern of rapid unlocks followed by password spray attempts is clearly adversarial

Lessons

  1. 01
    MFA bypass during account recovery is a critical gap. In this investigation, the attacker successfully passed SMS-based MFA verification twice to unlock the account via self-service password reset, even though all subsequent sign-in attempts from foreign IPs were blocked. This reveals that SSPR MFA validation may be weaker than sign-in MFA validation or that the attacker had access to the user's phone number. Implement step-up authentication for SSPR operations targeting privileged accounts, require additional verification (security questions, email confirmation) before account unlock, and monitor SSPR activity as aggressively as sign-in activity.
  2. 02
    A high block-rate is not containment. All five risky sign-in attempts were blocked by Conditional Access policies, which looked like a complete win. However, the attacker's two successful account unlocks via SSPR proved they had already compromised the account and could manipulate identity recovery mechanisms. Always audit what did NOT get blocked—the account unlocks, the password reset attempts, the directory changes—not just the sign-in blocks. The blocked count is the distractor.
  3. 03
    Geographically impossible travel is a reliable pivot. This investigation identified the attack within 21 hours because five distinct countries appeared in the sign-in logs within a single day. Honduras to Bangladesh to Malaysia to Spain to Philippines to Mexico is impossible for a human to travel. Implement automated alerting on geographic impossibility (e.g., sign-in from Country A, then Country B more than 1,000 km away within 2 hours). This pattern alone should trigger immediate account lockdown and MFA re-enrollment, regardless of whether individual sign-ins were blocked.
  4. 04
    VPN scores above 90 are not false positives. The Bangladesh IP had a VPN score of 99 from IPData, indicating near-certain VPN usage. A Honduras-based customer service agent has no legitimate reason to access Azure Portal through a Bangladesh VPN. Use VPN detection scores as a hard signal for administrative resource access; do not treat high VPN scores as noise. Pair VPN detection with resource type (Azure Portal, MFA management) to reduce false positives while catching real threats.
  5. 05
    Password policy enforcement saved this account. The attacker failed all four password reset attempts because they could not meet the organization's password complexity requirements. They tried weak passwords that violated policy, and the system rejected them. This is one of the few controls that worked end-to-end. Maintain strict password policies, enforce them consistently across all SSPR and admin reset flows, and monitor for repeated failed password changes as a sign of active attack.