Cybereason Blog | Cybersecurity News and Analysis

Cybereason Black Hat Live: An Attack Unraveled! Real Life Case Study

Written by Lital Asher-Dotan | Jul 26, 2016 8:49:53 PM

Discovering just one component of an attack can help an organization find additional components of the campaign, eventually leading to the entire hacking operation being revealed. A Cybereason customer used this method to discover an advanced persistent threat that had infiltrated its environment more than a year earlier. The organization assumed it had been hacked, but couldn’t find evidence to support this hypothesis.

By deploying Cybereason, the company was able to discover that the attackers had used legitimate processes to carry out malicious behavior. These tactics created a trail of evidence that, when followed, unraveled the entire attack. Ultimately, hackers managed to compromise 12 machines, including a domain name controller, giving them access to all the organization’s user names and passwords.

To learn how locating of one threat can help reveal an entire attack stop by Cybreason Black Hat booth #539 on Wedneday, August 3 at 2:00pm and Thursday, August 4 at 1:00pm, where Lotem Guy, Cybereason security research group manager, will talk about this customer case study.