LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

Stories from the SOC - Data exfiltration

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the LevelBlue SOC analyst team for LevelBlue Managed Threat Detection and Response customers.

Executive summary

The impact of Data Exfiltration, which is the act of copying or transferring data from a computer or server without authorization, has increased over the years and it can be difficult to detect because data is transferred regularly for normal business purposes. If not monitored accurately, company data can be stolen without anyone being aware. Companies in every industry, no matter the size, have sensitive data that must remain private (e.g. PHI, PII, PCI). Numerous examples in current events show how ‘stolen data’ can be detrimental to the productivity, reputation, and overall morale of the affected users. Not to mention the cost of disaster recovery, paying a ransom, or providing closure to customers of companies who have been breached.

The LevelBlue Managed Threat Detection and Response Security Operations Center (SOC) observed a connection between a customer asset and an indicator of compromise (IOC) with a known reputation as part of a malicious network ecosystem  to host and/or distribute malware. Facilitated by a relationship with Darktrace and their Cyber Intelligence Platform, an alarm was produced based on the observance of data being transferred out of the network over a 4-hour period via several external connections. Upon the acknowledgment of the alarm, the SOC was able to research correlating events and provide the customer a detailed explanation of what took place within the customer environment thus aiding in the mitigation of this threat.

Investigation

Initial Alarm Review

Indicators of Compromise (IOC)

A Sensor deployed in the customer environment was able to provide a parsed view of the alarm where we discovered a potential IOC that had been communicating with a customer asset. The analysts researched the foreign IP address using open source intelligence tools (OSINT), but did not find that it had a malicious reputation. Knowing that did not necessarily mean the activity was benign, the analysts investigated the event further to confirm the reputation of all IOCs present.

data exfiltration investigation

Expanded Investigation

Events Search

Upon looking into event logs of the alarm, another IOC < forum[.]comeback[.]pw > is produced. When cross-referenced with another OSINT tool, the domain is flagged for malicious intent.

extended investigation data exfil

data exfil investigation

Event Deep Dive

‘Suspicious’ alarms associated with the affected customer asset around the time of the original event were added to the Investigation, providing supporting detail for the customer.

data exfil events

Response

Building the Investigation

Based on the severity of the original alarm, and the fact that the IPs and domains provided different outcomes (one being malicious, one being benign), the SOC opened an Investigation. All supporting evidence was included in the Investigation, and a recommendation for remediation was also provided.

data exfil response

Customer Interaction

The customer was contacted immediately via telephone in accordance with their Incident Response Plan (IRP) after the investigation was created. Once assessed, the customer was able to confirm that the activity reported was not related to normal business activity. Configuration changes were carried out on the affected customer asset, mitigating the threat. The MTDR team provided a quick and concise breakdown of the event, along with a recommendation for remediation which made remediation seamless and timely for the customer.

data exfil customer interaction

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo