top of page

Insider Threat: Pattern Discovery in Regular Logins Across Different Machines

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 8, 2025
  • 2 min read

Summary:

This document reveals a significant case of an insider threat at a UK insurance company where unauthorized individuals were accessing network machines without proper authorization. Through the application of "Pattern Discovery" techniques, it was discovered that when authorized personnel were unavailable, unrecognized substitutes were utilized to log into the organization's network. This revelation highlighted potential issues with unauthorized access and signified a serious concern regarding insider threats within the firm.

Details:

This document is about an insider threat case involving a large insurance company in the UK during a trial. The story revolves around discovering a pattern of someone regularly logging into two specific machines, which didn't make sense according to the prospect and their management company. The username associated with this activity could not be found in the organization's phone book or among the named individuals in the contract with the outsourcing company. Upon further investigation, it was revealed that when authorized personnel were unavailable (either on holiday or sick), unrecognized substitutes were used to log into the network. This practice highlighted a potential insider threat and raised concerns about unauthorized access within the organization. This document discusses a major issue found by an insurance company in their network using the "Pattern Discovery" method, which allowed complete access to their network without them ever knowing about it. The discovery was made for the first time and likely would not have been identified otherwise. The information is tagged with various terms such as insider, pattern, discovery, threatdetector, and threat, indicating that these topics are related within the document context.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page