The Exatel SOC team is dedicated to active analysis and combating online threats. It monitors client security, assesses how cybercriminals operate, develops security measures and restores the functioning of attacked systems on a daily basis. In order to get a good understanding of what online threat analysis looks like and how are security measures developed, it is best to read an interesting case study.
Paranoids – analysis of hacker attack tools
The incident described in the “Paranoids” report may certainly arouse admiration for the level of the cybercriminals’ substantive technical background. The amount of effort they put in and the knowledge of the target environment is astounding. In this case study, with the aid of social engineering, as well as hacking and programming techniques, an attempt was made to infect machines of an IT specialist with malicious software. The attack was so well organized that the potential victim was saved only by his holding a really large dose of distrust.
The analysis of the tools used for the attack is a unique opportunity to look behind the scenes of the continuous war waged online everyday by security specialists and criminals. Owing to the tools at EXATEL SOC’s disposal, we are able to break down malware into its prime parts, and we can force it to show us how it communicates with the principals. In the case study, experts indicate how malicious software penetrates hard drives, how it infects system components, how it masks its presence and what commands it executes.