User Compromised via EvilTokens - Question

Posted by HovercraftSilver9379@reddit | sysadmin | View on Reddit | 15 comments

Hello,

I recently discovered one of our M365 users was compromised on Friday 5/15, via EvilTokens. I went through the usual remediation steps.

I have a question though - Why was our CA not triggered for Risky User/Risky Sign-in? I have it configured to trigger on medium and high risks for both sign-in and user risk.

Sign-in logs indicate 2 separate sign-ins from two different locations at the same time. Wouldn't this have at least triggered impossible travel? There was 0 risk associated with these sign-ins. Very confusing to me.

Maybe I have to CAs configured incorrectly? Any input is appreciated!

https://imgur.com/a/kVbvSMz