FireEye Offers Free Tool to Detect Malicious Remote Logins
Open source GeoLogonalyzer helps to weed out hackers exploiting stolen credentials to log into their targets.
FireEye today released an open source tool called GeoLogonalyzer for catching remote logins from hackers.
Stolen enterprise user credentials are all the rage among hackers these days, but spotting the bad guys among legitimate users logging in remotely can be difficult due to the large volume of remote access links to an organization.
David Pany, senior consultant at Mandiant, a FireEye company, says the tool helps analyze logs to spot geographically infeasible logins: flagging a New York-based user logging in at 13:00 and a few minutes later connecting to a VPN from Australia, for example. "Once remote authentication activity is baselined across an environment, analysts can begin to identify authentication activity that deviates from business requirements and normalized patterns," Pany said in a blog post today announcing the new free tool.
Other anomalies that could indicate hackers are logging in include user accounts registered to a single physical location that have logons from locations where the user is not likely to be sitting, as well as logons from different source-host names or via multiple VPN clients.
FireEye recommends several best practices for thwarting remote access hacks in addition to deploying GeoLogonalyzer, including limiting remote access from the Internet to sensitive data; instituting multifactor authentication using one-time tokens; and whitelisting legit IP address ranges for remote access users, among other steps.
GeoLogonalyzer is available under the Apache License 2.0 here via GitHub.
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024