Cybereason Black Hat Live: An Attack Unraveled! Real Life Case Study

Discovering just one component of an attack can help an organization find additional components of the campaign, eventually leading to the entire hacking operation being revealed. A Cybereason customer used this method to discover an advanced persistent threat that had infiltrated its environment more than a year earlier. The organization assumed it had been hacked, but couldn’t find evidence to support this hypothesis.

By deploying Cybereason, the company was able to discover that the attackers had used legitimate processes to carry out malicious behavior. These tactics created a trail of evidence that, when followed, unraveled the entire attack. Ultimately, hackers managed to compromise 12 machines, including a domain name controller, giving them access to all the organization’s user names and passwords.

To learn how locating of one threat can help reveal an entire attack stop by Cybreason Black Hat booth #539 on Wedneday, August 3 at 2:00pm and Thursday, August 4 at 1:00pm, where Lotem Guy, Cybereason security research group manager, will talk about this customer case study.

Cybereason Bsides and BH2016 ACTIVITIES

Lital Asher-Dotan
About the Author

Lital Asher-Dotan

Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.