Zoom Rare Input Devices

Original Source: [splunk source]
Name:Zoom Rare Input Devices
id:d290eeef-d05e-49a8-b598-72296023b87b
version:1
date:2025-06-02
author:Marissa Bower, Raven Tait
status:experimental
type:Hunting
Description:Detects rare input devices from Zoom logs. Actors performing Remote Employment Fraud (REF) typically use unusual device information compared to a majority of employees. Detecting this activity requires careful analysis, regular review, and a thorough understanding of the audio and video devices commonly used within your environment.
Data_source:
search:`zoom_index` microphone=* NOT (camera=*iPhone* OR camera="*FaceTime*" OR speaker="*AirPods*" OR camera="*MacBook*" OR microphone="*MacBook Pro Microphone*")
| rare microphone limit=50
| `zoom_rare_input_devices_filter`


how_to_implement:The analytic leverages Zoom logs to be ingested using Splunk Connect for Zoom (https://splunkbase.splunk.com/app/4961)
known_false_positives:This is a hunting query meant to identify rare microphone devices.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Remote Employment Fraud'
  asset_type:Identity
  mitre_attack_id:
    - 'T1123'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  security_domain:identity

tests:
  :
manual_test:None

Related Analytic Stories


Remote Employment Fraud