-
Q: What date was Mandiant contracted?A: October 12, 2012.
-
Q: What triggered the investigation?A: Law enforcement contacted the DoR on Oct 10, 2012, regarding stolen PII.
-
Q: What was the initial entry vector?A: A phishing email sent on August 13, 2012.
-
Q: How many valid user accounts were compromised?A: At least four.
-
Q: What encryption method was used for the data?A: AES 256-bit encryption.
-
Q: Did the attacker get the keys?A: The attacker stole the data key but not the Key Encrypting Key (KEK).
-
Q: How much data was exfiltrated?A: Approx 8.2 GB compressed, 74.7 GB uncompressed.
-
Q: What format was the data exfiltrated in?A: Encrypted 7-zip archives.
-
Q: How did the attacker move laterally?A: Using stolen credentials to log into the Citrix remote access portal.
-
Q: When was the containment plan executed?A: October 19-20, 2012.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.