Cyber Assessment Sample

Page 1

RESULTS FOR: CONFIDENTIAL

ANALYSIS DATE: March 2, 2023

Report of Findings Report of Findings

CONFIDENTIAL

Findings: Score Card

Findings: Score Card

RISK BREAKDOWN RESULTS FOR: HIGH 13 MODERATE 5 CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Methods Methods HIGH RISK ISSUES

IMPROPERLY ESCAPED SERVICE FILE PATH

Hackers use service paths like this to insert executables in the file path to allow them to gain service level or administrative level access to a device. This provides a way for the attacker to simply phish a user and gain additional access to the network or other resources that the normal user has rights to access.

COMPUTER SERVICE PATH

LAPTOPVCNSAR4G Intel(R) Audio Service

DESKTOP5U95QS0

LAPTOPVCNSAR4G

Nkdnssd Service

CZCanSrv

LAPTOPIQQHEBB8 Wondershare Native Push Service

C:\WINDOWS\system32\cAVS\Intel(R) Audio Service\IntelAudioService.exe

C:\Program Files\Nikon\Wireless Transmitter Utility\mDNSResponder.exe

C:\Program Files (x86)\Common Files\Carl Zeiss\CZCanSrv.exe

C:\Users\Dan\AppData\Local\Wondershare\Wondershare NativePush\WsNativePushService.exe

Remediation: Remediation: Add quotes to the services listed above so they are properly escaped and an attacker cannot insert malicious code into the path, restart the service and gain system level access.

Page 1/2
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Methods Methods

PENETRATION TEST - REASONING / METHODOLOGY

Do you know WHY users are your biggest cybersecurity threat? Because studies show that 91% of ALL cyberattacks start with a phishing email. This puts the hacker right inside your organization. Our team uses a proprietary (patent pending) process to go beyond phishing training and find out what a hacker can gain access to when someone in your organization is phished.

Internal Testing Internal Testing - Considering over 90% of cyberattacks begin with a phishing email and over 19.8% of employees click phishing email links, our team focuses on what the attacker will gain access to if a normal user were to click a link. We target employees who are the most likely to be phished. These employees also happen to be the ones who have the most to lose: CEOs, CFOs, Directors, HR and sales team members. Why are they more likely to be phished in the first place? They are often communicating with people outside your organization AND they process many more emails than others.

External Testing External - What about the other 9% of attacks, how do they get started? Hackers build sophisticated automation that is constantly scanning the internet looking for vulnerabilities. They use these vulnerabilities to get into networks. Galactic Advisors uses some of the same tactics to outline the perimeter of your organization, look for exposed services, find vulnerabilities, and attempt to exploit them.

The following report contains evidence of our findings, remediation steps, as well as descriptions of the risks associated with them.

Hackers are constantly coming up with new attack chains and vulnerabilities. These new methods need to be evaluated and remediated often. Best practice includes regular ongoing security assessments to identify and respond to these new threats.

Page 2/2
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Accounts Accounts MEDIUM RISK ISSUES

ACTIVE USERS WITHOUT EXPIRING PASSWORDS

Attackers exploit leaked passwords to gain network access. Stale passwords jeopardize the network to breaches and attacks, and are completely preventable through an enforced password change policy.

COMPUTER NAME

USERNAME

DESKTOP-TR1HINT 19412

LAPTOP-4DFNJFKE Anna Canto

CODDING C.Odding

DESKTOP-5U95QS0 c.tischer

LAPTOP-E60M994E capit

LAPTOP-FCUJEDUC clang

LAPTOP-CKLLGUR5 cruss

LAPTOP-IQQHEBB8 Dan

LAPTOP-CVTEE2T3 Dane Bedward

LAPTOP-4DFNJFKE IT

CODDING IT

LAPTOP-2T6SJT8M kamas

Remediation: Remediation: Enforce a password policy for all organization-related accounts. Monitor for non-compliance and remediate user password hygiene when necessary.

Page 1/6
CONFIDENTIAL
2, 2023
CONFIDENTIAL
ANALYSIS DATE: March

Accounts Accounts MEDIUM RISK ISSUES

ADMIN USER PASSWORD DOES NOT EXPIRE

Administrative user accounts have unrestricted access to critical infrastructure on the network. Hackers aggressively hunt for administrative credentials as a means to access your network. Stale administrator passwords open organization-wide risk to data breaches and attacks.

USERNAME GROUP

19412 Administrators

Anna Canto Administrators

C.Odding Administrators

c.tischer Administrators

capit Administrators

clang Administrators

cruss Administrators

Dan Administrators

Dane Bedward Administrators

IT Administrators

Remediation: Remediation: Create a policy in Active Directory to force Administrative users to change their passwords periodically. Also consider enforcing password complexity, length and reuse rules. Also, create guidelines when use of an Administrative account is acceptable.

Page 2/6
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Accounts Accounts HIGH RISK ISSUES

DISTRIBUTED LOCAL ADMIN ACCOUNT

The same admin account is used on multiple machines. When this account shares a password, attackers can use the NTLM hash to move laterally from computer to computer without even cracking the password.

Remediation: Remediation: Do not use the same admin account and password on multiple machines.

Page 3/6
USERNAME COUNT IT 5 User 3
CONFIDENTIAL
DATE: March 2, 2023
CONFIDENTIAL ANALYSIS

Accounts Accounts HIGH RISK ISSUES

PASSWORDS CRACKED

Total passwords cracked: 365 Total passwords cracked: Passwords were cracked on computers within the environment. Hackers use tools like memory abuse, abusing user privilege, and ripping to obtain access to your passwords when you are phished. When this happens, these passwords are used to break into systems inside and even outside of the victim's environment. Below is a small sample of the passwords that were cracked. For a complete listing of passwords our team cracked by abusing user privilege refer to the detail report. COMPUTER

CODDING Chrome c.odding@ Spid**** https://app.qualio.com/

CODDING Chrome christopherodding@gm Oddi**** https://my.wealthsimple.com/app/

CT1807 Chrome araig21 Swpa**** (empty)

CT1807 Chrome c.cuerrier@ SWT0**** https://portal-portail.nrc-cnrc.gc.ca/en...

CT1807 Chrome CuerrierC Spid**** https://iip-pip.nrc-cnrc.gc.ca/src/Accou...

CT1807 Chrome CuerrierC Spid**** https://portal-portail.nrc-cnrc.gc.ca/en...

CT1807 Chrome j.jonas@si qaNO**** https://app.socio.events/MjEwMDM/auth/lo...

CT1807 Chrome j.keir@so Melo**** https://spiderwort.melon.travel/login

Remediation: Remediation: Work with users and train them to never store their passwords inside browsers or other memory on the device. Review the passwords that were uncovered during this evaluation, consider additional training around password complexity. Implement password manager with multifactor authentication capabilities to make it difficult for the attacker to get to the memory storing the password set.

When a user is phished and clicks a link, there is one thing running EVERY SINGLE TIME: their web browser. Hackers quickly abuse the user's privileges, identify the cypher for the browser, and then use that cypher to access all passwords, tokens, cookies and private data that web browser has access to. The attacker takes this data set and uses it to access additional accounts to find out more about their victim or to identify a list of people who trust the victim. They use this list to then infect other unsuspecting organizations.

Page 4/6
NAME BROWSER LOGIN NAME PASSWORD URL
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Accounts Accounts HIGH RISK ISSUES

CRACKED PASSWORDS FOUND ON THE DARK WEB

Our team was able to crack a number of passwords. The passwords identified here should be addressed immediately. We were able to locate these within lists of passwords that are currently being shared on the dark web. This means that any account using this password may already be compromised.

Remediation: Remediation: Change these passwords immediately and look for indicators of compromise. A few indicators of compromise include logins from locations you do not expect, a large uptick in spam or phishing, or changes to your password you didn't make. Do not use these passwords again as they are already compromised.

Page 5/6
COMPUTER NAME BROWSERLOGIN NAME PASSWORD URL NUMBER OF BREACHES LAPTOP26A8B5PP Chrome patel.palak54@gmail. Blue**** https://sso.wagepoint.com/login 9 LAPTOP26A8B5PP Chrome patel.palak54@gmail. Blue**** https://www.foodsafetytraining.ca/wp-log... 9 LAPTOP26A8B5PP Chrome patel.palak54@gmail. Blue**** (empty) 9 LAPTOP26A8B5PP Chrome patel.palak54@gmail. Blue**** https://www.winni.in/checkout/adv/ 9 LAPTOP8NG44J86 ChrEdge (empty) Darw**** https://account.activedirectory.windowsa... 2 LAPTOP8NG44J86 ChrEdge (empty) Darw**** https://ca.docusign.net/Signing/ 4 LAPTOP8NG44J86 ChrEdge (empty) Darw**** https://app.salonrunner.com/customer/sig...4 LAPTOP8NG44J86 ChrEdge grooove_armada@hotma Darw**** https://www.linkedin.com/signup/cold-joi... 4
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Accounts Accounts HIGH RISK ISSUES

PASSWORD REUSE DETECTED - SUMMARY

The same password appears to be used for multiple accounts or multiple cloud services. Attackers are constantly trying to break into networks using passwords they harvest by breaching external sites and cloud services. Because of this, reusing passwords in this way increases your risk for identity theft, spear phishing and data breach. COMPUTER NAME

LAPTOP-CT79JCR1 user sales@fairytreehome.

LAPTOP-CT79JCR1 user mmmsweetmitch@hotmai

DESKTOP-TR1HINT Jessica jljonas925@gmail.com

LAPTOP-CT79JCR1 user mmmsweetmitch@hotmai

LAPTOP-4MBL7SHE KMaclaren LCCAD\kmacla@lacitec

LAPTOP-CKLLGUR5 cruss LCCAD\crusse

LAPTOP-8NG44J86 ygerv Yvesgervais1

LAPTOP-26A8B5PP ppate patel.palak54@gmail.

Remediation: Remediation: On average each user in a typical organization accesses 30 different accounts and cloud services. Consider a password manager to help your team manage all these passwords while avoiding password reuse. Based on these findings we also recommend training your team on managing and proper methods for creating passwords.

With over 300,000,000,000 compromised passwords available on the dark web, it is obvious that hackers know how to get their hands on passwords. How do they do this? One way is to steal them from websites. Breaches like Dunkin Donuts, Netflix, Gmail, Yahoo, Facebook, and LinkedIn produced billions of active username / password combinations. Currently hackers are crawling the internet, using these passwords to try to get into networks like yours.

Page 6/6
PASSWORD SITES
USERNAME LOGIN NAME
Dezm**** 144 sites
Dezm**** 66 sites
JJ09**** 12 sites
Time**** 10 sites
#Ski**** 8 sites
Halp****
8 sites
Darw****
7 sites
Blue****
4 sites
CONFIDENTIAL CONFIDENTIAL ANALYSIS
2,
DATE: March
2023

M365 M365 HIGH RISK ISSUES

M365 ACCESS TOKEN STOLEN

Hackers abuse memory and user privileges to access browser cookies and tokens. Cookies and tokens are the digital keys that allow users to have continued access to tools like M365 without having to reenter their passwords. Some of these digital keys have expiration dates, while others are valid forever. Our team was able to exfiltrate M365 keys for the users in this list. These are all keys that do not expire, giving the attacker access to each account until the user changes their password.

Remediation: Remediation: Consider policy to stop users from saving persistent cookies to their devices users persistent to their devices . These cookies are especially dangerous because they are usable even after the user logs off their session. Consider password rotation to expire these permanent cookies.

Page 1/2
COMPUTER NAME USERNAME NAME SOURCE
KMaclaren ESTSAUTHPERSISTENT Chrome
KMaclaren ESTSAUTHPERSISTENT ChrEdge
C.Odding ESTSAUTHPERSISTENT Chrome CODDING C.Odding ESTSAUTHPERSISTENT ChrEdge
User ESTSAUTHPERSISTENT ChrEdge
ygerv ESTSAUTHPERSISTENT ChrEdge
NCrawford ESTSAUTHPERSISTENT Chrome
NCrawford ESTSAUTHPERSISTENT ChrEdge
LAPTOP-4MBL7SHE
LAPTOP-4MBL7SHE
CODDING
LAPTOP-2OIS6BLM
LAPTOP-8NG44J86
LAPTOP-E60M994E
LAPTOP-E60M994E
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

M365 M365 HIGH RISK ISSUES

INCREASED RISK OF ADMINISTRATIVE ACCOUNT COMPROMISE

The accounts listed in this section are Global Administrators and also appear to be licensed for email access. Using a Global Admin account for email access greatly increases the chances of the account being compromised either through cookie / token theft or through credential phishing.

ACCOUNT GROUP LICENSE

s.hanson@onmicrosoft.com

Global Administrator

O365_BUSINESS

Remediation: Remediation: Do not use Global Admin accounts for day-to-day Microsoft 365 access. Do not use Admin accounts for day-to-day 365 access. Instead create a separate account that you only access when using a browser in private mode. This reduces the chances of having credentials stolen and greatly reduces the ability for an attacker to steal cookies / tokens for this account.

Page 2/2
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Patches Patches

WINDOWS HOME VERSION INSTALLED WITHIN THE ENVIRONMENT

Windows Home version should not be installed in a professional environment. They do not support encryption or security policy.

COMPUTER NAME USERNAME OPERATING SYSTEM

CODDING C.Odding Microsoft Windows 11 Home

LAPTOP-26A8B5PP ppate Microsoft Windows 11 Home

LAPTOP-2OIS6BLM User Microsoft Windows 11 Home

LAPTOP-2T6SJT8M kamas Microsoft Windows 11 Home

LAPTOP-4DFNJFKE Anna Canto Microsoft Windows 11 Home

Remediation: Remediation: Install Pro Version of Windows OS on the following computers.

Page 1/3
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Patches Patches

REMOTE ACCESS SOFTWARE DETECTED

Remote Access Software Detected

COMPUTER

REMOTE ACCESS SOFTWARE

LAPTOP-IQQHEBB8 TeamViewer

Remediation: Remediation: Make sure that this remote access software is up to date or uninstall it if it should not be present.

Page 2/3
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Patches Patches MEDIUM RISK ISSUES

WEAK ENCRYPTION METHODS SUPPORTED BY SERVER

Servers listed on this page allow client connections using weak encryption. Simply having secure web traffic (HTTPS) enabled is not enough. Weak encryption allows attackers to decrypt data and intercept content that is transmitted via HTTPS, potentially revealing sensitive information like passwords, credit card data, or multifactor authentication tokens.

Remediation: Remediation: Disable weak encryption methods in favor of secure, up-to-date protocols. Like any other standard, HTTPS and its component parts evolve to keep pace with the current threat landscape. Disable TLSv1.0 and TLSv1.1, forcing transport via TLSv1.2 or TLSv1.3

Page 3/3
IP PORT RISK 37.19.211.85 6443 SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection 37.19.211.85 443 SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection 37.19.211.78 443 SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection 37.19.211.78 6443 SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection 37.19.211.58 6443 SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Antivirus Antivirus HIGH RISK ISSUES

BITDEFENDER NOT INSTALLED ON ALL COMPUTERS WITHIN THE ENVIRONMENT

BitDefender was not installed on a subset of computers within the environment. In order to have an effective antivirus solution, the same antivirus needs to be installed on all computers within the secured environment.

COMPUTER NAME

USERNAME

CODDING C.Odding

LAPTOP-2T6SJT8M kamas

Remediation: Remediation: Install BitDefender on computers where it is missing.

Page 1/2
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Antivirus Antivirus HIGH RISK ISSUES

SYSTEM DID NOT PRODUCE ALERTS FOR PASSWORD CRACKING ATTEMPTS

When an attacker phishes a user, they use tools on the device to crack passwords. It does not appear that the logs in this environment are producing the proper alerts for this type of behavior.

Remediation: Remediation: Verify Windows Advanced Auditing is configured to detect malicious behavior like NTLM hash dumping.

Page 2/2
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Firewalls Firewalls MEDIUM RISK ISSUES

REMOTE DESKTOP PORT OPEN

Attackers use Remote Desktop to move laterally inside networks. Currently big game hunters like Ryuk are using this to deploy ransomware.

Remediation: Remediation: Reduce your risk by disabling Remote Desktop ports if at all possible.

Page 1/4
COMPUTER NAME USERNAME ADDRESS PORT CODDING C.Odding 10.136.102.7 3389 LAPTOP-8NG44J86 ygerv 10.255.0.12 3389 LAPTOP-8NG44J86 ygerv 10.255.4.241 3389 LAPTOP-8NG44J86 ygerv 10.255.4.254 3389
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Firewalls Firewalls HIGH RISK ISSUES

MYSQL DATABASE PORT OPEN

Hackers use access to tools like MySQL Server to bypass multifactor authentication or exfiltrate data.

Remediation: Remediation: Close MySQL ports or limit them only to computers that require access.

Page 2/4
COMPUTER NAME USERNAME ADDRESS PORT LAPTOP-8NG44J86 ygerv 10.255.0.157 3306 LAPTOP-8NG44J86 ygerv 10.255.4.38 3306 LAPTOP-8NG44J86 ygerv 10.255.4.63 3306 LAPTOP-8NG44J86 ygerv 10.255.6.38 3306 LAPTOP-8NG44J86 ygerv 10.255.6.70 3306
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Firewalls Firewalls HIGH RISK ISSUES

FIREWALL DEEP SCAN RESULTS

The firewall failed to block traffic containing a simple malicious payload. Additional analysis is required to determine the cause of this issue.

Remediation: Remediation: Verify deep packet inspection is properly enabled and configured for HTTPS traffic. Contact the team at Galactic Advisors for additional tools to perform an advanced analysis.

Page 3/4
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Firewalls Firewalls HIGH RISK ISSUES

EXTERNAL IP VULNERABILITY SUMMARY

Hackers use automated analysis tools to identify weaknesses in external infrastructure. They are constantly scanning the internet looking for vulnerable systems. Using a similar method the following vulnerabilities were identified on the external addresses associated with your organization. Our team did not exploit these vulnerabilities to validate the attack chain, however each of these should be closely inspected and patched.

Remediation: Remediation: These vulnerabilities are outlined in detail within the firewall section of the Detail Report. Remediation steps for each item can be found there.

Page 4/4
IP HIGH MEDIUM LOW 138.199.57.45 0 1 1 142.115.67.10 0 0 1 142.93.157.127 0 1 2 146.70.112.132 0 1 1 184.146.156.148 0 0 1 209.87.249.2 0 0 1 37.19.211.105 0 1 1 37.19.211.43 0 1 1 37.19.211.55 0 1 1 37.19.211.58 0 1 1
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Education Education

POSSIBLE SENSITIVE DATA BEING EMAILED

Sensitive data is possibly allowed to be transferred through unsecure avenues like email.

Remediation: Remediation: Since e-mail is a highly unsecure way of sending PII (personally identifiable information) such as health-related information or medical records, social security numbers, credit card, banking or financial information, it`s essential to have e-mails encrypted to prevent the contents from being read by anyone other than the intended recipients. We strongly encourage a more extensive and robust assessment be done immediately to determine what, if any, exposure you may have.

Page 1/5
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Education Education

SENSITIVE DATA BEING SENT VIA CLOUD FILE-SHARING APPLICATIONS

Sensitive data is currently allowed to be transferred through cloud file-sharing applications.

Remediation: Remediation: Depending on the type of file-sharing application used, you may have security considerations to address. We do not endorse the use of free versions of file-sharing applications. If file-sharing applications are in use, best practice is to use a business version that offers appropriate security controls to safeguard your data. Our assessment will detect if any file-sharing applications are installed on computers connected to your network. If file-sharing applications are found, we recommend a further analysis to determine if anyone is using the free versus business versions of these applications and if the data being placed in these systems is being done so according to best practices to ensure the security of your data.

Page 2/5
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Education Education

UNSURE IF CYBER LIABILITY INSURANCE IS IN PLACE

Unsure if cyber liability insurance is in place.

Remediation: Remediation: If your organization handles, stores or has access to highly sensitive data (such as medical records) or any data that is required by law to be secured, we strongly recommend meeting with a qualified insurance professional who specializes in cyber liability to discuss getting a policy in place to cover financial losses that result from data breaches and other cyber-events. One single cyber-attack can quickly escalate, making your office "ground zero" for attacks and data breaches for your clients. We also recommend reviewing policies regularly, in conjunction with performing risk and vulnerability assessments, to ensure the coverages align with your risk tolerance and to ensure you are appropriately covered.

Page 3/5
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Education Education

UNSURE IF CRIME INSURANCE IS IN PLACE

Unsure if crime insurance is in place.

Remediation: Remediation: With ransomware and bank fraud at an all-time high, we strongly encourage our clients to meet with a qualified insurance specialist to get a crime policy in place. A good commercial crime policy provides coverage for a host of financial losses incurred from a number of crime-related instances, such as vendor or employee theft, computer fraud, funds transfer fraud, ransomware and extortion, which are tactics commonly used by cybercrime rings.

Page 4/5
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Education Education

SOME IT POLICIES ARE IN PLACE AND EMPLOYEES SIGN THAT THEY HAVE READ THEM

Has some key IT Policies in place and employees sign off once they have read and understood each policy.

Remediation: Remediation: Not all policies have been put in place. We recommend all policies be put in place. For the policies that are currently in place be sure to scan and store these signed policies in your employee`s personnel file. We also recommend you revisit these policies at least once a year to ensure they are up-todate.

Page 5/5
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Encryption Encryption HIGH RISK ISSUES

UNENCRYPTED HARD DRIVES

The following lists all unencrypted drives found in the network.

Remediation: Remediation: Make sure drives are encrypted.

Page 1/1
COMPUTER NAME USERNAME DRIVE NAME DRIVE FORMAT DRIVE TYPE ENCRYPTION STATUS CODDING C.Odding G:\ FAT32 Fixed FullyDecrypted CODDING C.Odding C:\ NTFS Fixed FullyDecrypted CT1807 User G:\ FAT32 Fixed FullyDecrypted DESKTOP-5U95QS0 c.tischer G:\ FAT32 Fixed FullyDecrypted LAPTOP-2OIS6BLM User C:\ NTFS Fixed FullyDecrypted LAPTOP-2OIS6BLM User G:\ FAT32 Fixed FullyDecrypted LAPTOP-2T6SJT8M kamas C:\ NTFS Fixed FullyDecrypted LAPTOP-2T6SJT8M kamas G:\ FAT32 Fixed FullyDecrypted LAPTOP-4DFNJFKE Anna Canto C:\ NTFS Fixed FullyDecrypted LAPTOP-4MBL7SHE KMaclaren C:\ NTFS Fixed FullyDecrypted LAPTOP-8NG44J86 ygerv C:\ NTFS Fixed FullyDecrypted LAPTOP-CKLLGUR5 cruss C:\ NTFS Fixed FullyDecrypted
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Surveillance Surveillance MEDIUM RISK ISSUES

GENERAL SURVEILLANCE WARNING

See antivirus and firewall section - it does not appear that alerting is properly configured to detect an advanced persistent threat in the environment.

Remediation: Remediation: See antivirus and firewall section to address issues.

Page 1/1
CONFIDENTIAL CONFIDENTIAL ANALYSIS DATE: March 2, 2023

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.