database server. The threat extracts this credential material and uses to communicate with a Windows domain controller to extract an even greater elevated credential from a Windows domain
controller using the dcsync[6]
technique. The threat-actor repeats the situational awareness and enumeration cycle using the newly gained credentials from the domain controller. The intended target is identified and located on a sensitive file repository. The threat-actor prepositions themselves using the access and information gained and achieves its final objective by exfiltrating sensitive data from the network.
Answer the following questions as if you were part of the targeted organization.
Is this scenario reasonable?
Were opportunities presented to detector prevent the threat?
Could your current
security program prevent, detector respond to this threat?
Are you sure?
Have you verified?
If so, how?
What techniques or indicators were left behind by this threat?
Organizations often blame the end-user who clicked the link. This scenario indicates an organization's entire security model may depend on users not clicking a link in an email. What about the actions the threat took after the initial click Many organizations do not intend to hinge
all security on a single user, but the steps taken to defend systems often say otherwise.
Share with your friends: