
The SOC case files: XDR’s automated threat response delivers high speed protection to an employee in the cloud
Incident summary
- An employee at a telecommunications company connected as usual to their cloud account.
- They then appeared to travel a distance of 361 km, roughly 225 miles, at nearly twice the speed of sound before logging in again, according to the data reaching Barracuda Managed XDR’s automated detection systems.
- These detection systems simultaneously registered that:
- The second user login used a different device.
- The second login came from an IP and location that was unusual for this user.
- This IP was flagged as malicious.
- Taken together, there was a 99% chance of the account being compromised by a threat actor.
- Because the user’s employer had Automated Threat Response as part of XDR Cloud Security, the impacted account was automatically suspended, the customer was alerted, and the incident was shut down.
The incident was detected, contained, and mitigated by the Automated Threat Response functionality of Barracuda Managed XDR Cloud Security. Barracuda Managed XDR is an extended visibility, detection, and response (XDR) service that provides customers with round-the-clock human and AI-led threat detection, analysis, incident response, and mitigation services to protect against complex threats.
How the attack unfolded
One afternoon at around 3:25 p.m., an employee at a telecommunications company connected to their cloud account with their usual device and from their usual location.
- They then appeared to travel at over 2,160 km per hour, the speed of an advanced Lockheed SR-71 Blackbird reconnaissance plane, to a location they’d rarely visited, if at all, and logged into their account again using another device.
- This anomalous activity triggered a whole range of red flags in Barracuda XDR detection systems.
- The second login was identified as suspicious and unauthorized.
- It exhibited four characteristics that suggested account compromise with 99% confidence:
- The ‘impossible travel’ scenario, covering a distance of 361 km (roughly 225 miles) at nearly twice the speed of sound between logins.
- A different device was used in the second, suspicious login.
- Barracuda Managed XDR’s machine learning indicators flagged the IP address and location associated with the suspicious login as ‘rare’ for the impacted user account.
- Threat intelligence flagged the IP address used in the suspicious login event as possibly malicious.
Threat response and mitigation
- Not long after the second login attempt, XDR’s machine learning model validated the anomalous characteristics of the suspicious login event and triggered a malicious detection alert.
- Six minutes later, XDR automatically suspended the impacted account and issued a security warning to the organization.
- A cybersecurity analyst from the SOC followed up with a call to the organization to let them know in person. The organization confirmed the incident as a true positive.

Key learnings
- In addition to implementing security solutions such as Barracuda Managed XDR with Automated Threat Response and advanced, multilayered email protection, organizations can harden their protection against such incidents through robust policies and employee training.
- This should include conditional access policies — such as only allowing authentication from authorized locations — multifactor authentication measures (MFA), and rotating credentials regularly to avoid having stale/leaked passwords in active use.
- Security awareness training will help to prevent users from falling victim to MFA fatigue and increasingly complex and evasive phishing attacks.
Barracuda Managed XDR features like threat intelligence, Automated Threat Response, and the integration of wider solutions such as XDR Server Security, XDR Network Security, and XDR Cloud Security, provide comprehensive protection and can drastically reduce dwell time.
For further information on how Barracuda Managed XDR and Security Operations Center can help, please contact us.
Subscribe to the Barracuda Blog.
Sign up to receive threat spotlights, industry commentary, and more.