https://store-images.s-microsoft.com/image/apps.2710.9871de3d-1886-45a4-a9fb-ab197106dd10.837e0200-7997-41e8-96bc-9c507ab24f66.75dee294-6159-4a66-b282-d5ca04e05dcd

Credential Theft Hunt and Anomaly Validation

by People Tech Group Inc

Automatically correlates endpoint, identity, and network logs to validate credential theft alerts.

The Credential Theft Hunt & Anomaly Validation Agent acts as a virtual Tier 1 SOC analyst, automatically investigating credential theft alerts to determine if they are real incidents or false positives.

This agent solves the "alert fatigue" problem. Instead of just flagging a single, noisy event (like LSASS memory access), it automatically hunts for related evidence across your Microsoft Sentinel workspace to confirm a real attack.

Key Features
- Automated Correlation: Connects the dots between suspicious endpoint telemetry (from Defender XDR), identity anomalies (from Entra ID), and lateral movement (new RDP/SMB connections).
- High-Fidelity Incidents: Stops the noise by only creating a high-confidence incident in Sentinel when multiple, related pieces of evidence are found.
- Reduces Analyst Workload: Automatically performs the initial hunt, provides a full Markdown summary, and reduces Mean Time to Detect (MTTD).

How It Works
When an alert is triggered or on a scheduled hunt, the agent runs a series of KQL queries to find correlated events, including:
- Suspicious processes (mimikatz.exe, procdump.exe)
- Anomalous sign-ins (Impossible Travel, new device)
- New outbound RDP or SMB connections

If a strong correlation is found, the agent calculates a confidence score and creates an enriched incident for your team to review.

At a glance

https://store-images.s-microsoft.com/image/apps.25231.9871de3d-1886-45a4-a9fb-ab197106dd10.837e0200-7997-41e8-96bc-9c507ab24f66.16561e32-70f2-4a9b-947f-535bf076cb00
https://store-images.s-microsoft.com/image/apps.50694.9871de3d-1886-45a4-a9fb-ab197106dd10.00278bbb-d0d7-4fc0-9277-fb1d49b77ee2.6ee51665-0168-4975-a295-a73da6e6af90
https://store-images.s-microsoft.com/image/apps.12053.9871de3d-1886-45a4-a9fb-ab197106dd10.00278bbb-d0d7-4fc0-9277-fb1d49b77ee2.083060a1-669a-474d-87c2-bef4bff67c33