Top Categories

Spotlight

todayMarch 28, 2020

Case Study Mjolnir Security

Attack Type – Exploitation of novel / 0-day vulnerability

Scenario: Org2 is a specialist technology company based in the UK. The Org2 IT security operations team responded to an alert from its corporate anti-virus provider that a copy of password stealing malware had been found on three of its domain controllers. This was a serious incident, and an investigation [...]

Top Voted
Sorry, there is nothing for the moment.

Attack Type – Phishing for Credentials

Case Study Mjolnir Security todayNovember 4, 2019

Background
share close

Scenario:

Org 9 is a multi-national Japanese manufacturing robotics company headquartered in Japan with European operations. Org 9 designs and manufactures robotics used in fabrication and manufacturing facilities throughout the world from automotive production lines to the assembly of microelectronics.

The UK branch of Org 9 received a notification from its Japanese IT security team that a user had reported a suspicious incident. The incident consisted of emails received from two UK employees, a high- level engineer and salesperson who were long-standing and trusted employees. The recipients were chief design engineers and executives located in Japan.

The suspected emails contained a malicious executable. Since the email was sent internally from employee to employee, the email had not traversed usual email spam filtering, which blocks encrypted executable files.

When queried regarding the emails, the two employees stated they had not sent the emails, which raised suspicion of a suspected compromise of the user’s credentials, laptops or the Org 9 UK corporate infrastructure and exchange environment.

An investigation was carried out on the user laptops, which did not identify any malware or evidence that the emails had been sent from the user’s laptops. Upon examination of the email headers and Exchange Server logs, it was determined that the emails had originated from Outlook Web Access (OWA) sessions, which allows users to log on and send emails directly from the internet.

The user’s accounts did not show high levels of failed password attempts and their passwords were complex and regularly changed.

However, upon examination of email logs, it was noted that the two users had logged on to OWA from the same source once a week prior to the incident when both employees attended a trade show in Belgium where Org 9 was an exhibitor. Examination of the users’ internet cache revealed a fake OWA page that was made to represent the OWA login page. Further analysis indicated that the two laptops authenticated to a wireless access point whilst attending the event that matched the network name, but did not have a hardware (BSSID) address that matched any wireless access points at the event premises. It was subsequently determined that a fake wireless access point had been operating near the Org 9 stand at the event which intercepted requests to the Org 9 domain and redirected to a fake Org 9 OWA page in order to steal user’s credentials and conduct further targeted social engineering attacks against Org 9 employees in the Japanese headquarters.

Specific Failures Leading to Compromise

  • User awareness training of phishing attacks and use of trusted networks only


Attack Timeline

Targeting to Compromise Days (Exact time to plan targeting unknown)
Compromise to Exfiltration 7 days
Compromise to Discovery 8 days
Compromise to Containment 8 days
Method of Discovery Internal – Employee reported incident
Threat Actor External – Highly targeted
Assets compromised UK Employees email communications, Japanese Employees’ workstations
Business Impact Low – Mail from phished employees compromised but incident caught early

Written by: Mjolnir Security

Previous post

Case Study Mjolnir Security / September 10, 2019

Financial Service Provider

The use of email cloud technology offers innumerable advantages over the classic on-premises solution. Unfortunately, it comes with its own trade-offs from a cybersecurity standpoint as this financial service provider organization discovered. A cyber criminal was able to gain unauthorized [...]


Similar posts

Case Study Mjolnir Security / December 15, 2019

Paytm – Darknet Threat Intelligence

Cyber criminals are relentless and very creative, they will gladly exploit any cyber weakness that appears within a company. For Paytm, this couldn’t be truer. As a financial technology company operating a worldwide online payment system, there is no lack of criminals planning and attempting to target the organization due to its nature. Having the ...

Read more trending_flat