InsideOut

InsideOut

Insider Threat Detection Report

Sessiondemo-session-2026-02-16
Generated2026-02-17 19:44:25
Period2026-02-16 09:45 – 10:15
0Risk Score

Executive Summary

An insider threat campaign was detected originating from alex.martinez@example.com. The subject conducted systematic reconnaissance of sensitive SharePoint sites, escalated privileges by self-enrolling in the Finance-Admins security group, exfiltrated budget and payroll documents via bulk downloads and external sharing links, and attempted to cover tracks by deleting sharing links and generating decoy file access. The overall risk score of 0.92 indicates a high-severity incident requiring immediate response.

Subject Profile

AM
Subjectalex.martinez@example.com
Campaign TypeData Exfiltration
Total Actions27
Session IDdemo-session-2026-02-16

Attack Chain

Recon

Site enumeration, file discovery, keyword searches

16 actions|12/16 detected

Escalation

Self-enrollment in security groups, access requests

4 actions|4/4 detected

Exfiltration

Bulk file downloads, external sharing, email exfil

4 actions|4/4 detected

Evasion

Link deletion, decoy file access, evidence destruction

3 actions|0/3 detected

Detection Findings

HIGHRisk: 0.922026-02-16 10:08:00

Bulk Sensitive File Download

User alex.martinez@example.com downloaded multiple sensitive financial documents (Budget_2024.xlsx, Payroll_Summary.xlsx) within a short time window. This significantly exceeds their normal download baseline.

User:alex.martinez@example.com
HIGHRisk: 0.952026-02-16 10:12:00

External Data Sharing

User created an anonymous sharing link for Budget_2024.xlsx and sent an email to personal@gmail.com with subject 'Q1 Review'. This represents a data exfiltration attempt via two independent channels.

User:alex.martinez@example.com
MEDIUMRisk: 0.652026-02-16 10:02:00

Privilege Escalation Attempt

User added themselves to the Finance group and requested direct access to restricted resources. This self-service privilege escalation bypasses normal access request workflows.

User:alex.martinez@example.com
MEDIUMRisk: 0.702026-02-16 10:15:00

Anti-Forensics Behavior

Sharing link for Budget_2024.xlsx was deleted shortly after use for data exfiltration. This temporal pattern indicates deliberate evidence destruction to avoid detection.

User:alex.martinez@example.com
LOWRisk: 0.402026-02-16 09:48:00

Broad Site Enumeration

User enumerated all available SharePoint sites and performed targeted searches for 'budget' and 'payroll' keywords. While individual actions may be benign, this pattern is consistent with insider threat reconnaissance.

User:alex.martinez@example.com

Detection Performance

0Detection Rate
Total Actions0
Detected0
Missed0

Phase Breakdown

Recon12/16 (75%)
Escalation4/4 (100%)
Exfiltration4/4 (100%)
Evasion0/3 (0%)

Verdict

Strong detection (81.8%). Strong on escalation, exfiltration. Weak on evasion.

Recommendations