After two weeks enduring an attack from multiple unidentified threat actors, a telecommunications company called in The DAR Team.
The DAR Team’s Human Intelligence capabilities turned the tide.
By identifying and socially engineering the threat actors into giving away their position, The DAR Team helped the company and their counsel:
The company was able to identify and remediate a key weakness in its supply chain, potentially avoiding a cascade of future data breaches.
Who: A large Silicon Valley-based telecommunications infrastructure provider.
The Incident: The company was breached by a targeted attack by unidentified threat actor/s. This wasn’t ransomware; it was something potentially worse – the threat actor/s seemed to have continuous access to the company’s data supply chain.
Internal incident response wasn’t able to identify the source, velocity, or impact of the breach, leaving them at the mercy of the threat actors. Outside help from conventional incident response – and a name-brand threat intelligence provider -- proved toothless and, worse, wasted two weeks while the crisis spiraled.
During this time, news of the breach broke publicly in the media. Customers and investors were as anxious for answers about the breach as the company was to find and provide them. The longer the company went without providing any details around the attack the more damage the company’s reputation around their security and diligence programs endured. Finding answers about the attack was becoming more and more critical by the hour.
How they found The DAR Team: The company engaged outside legal counsel early in their ordeal. When containment efforts and attempts to identify root causes failed, their “breach coach” suggested a new resource: deep human intelligence capabilities to go behind enemy lines.
The Mission: The company wasn't willing to negotiate with a threat actor or pay a ransom. The DAR Team empowered an alternative: break the standstill in their investigation by infiltrating the attacker’s organization. This meant DAR’s operatives would leverage their dark web personas to socially engineer an opportunity to collect new information about the cause and scope of the breach.
As with all DAR Team engagements, the engagement started with a crash course on the situation and the company’s objectives. Where other providers begin with a script, The DAR Team worked to match specific outcomes to their capabilities.
After understanding the company's intelligence needs and goals, The DAR Team provided some options:
The company opted for all three options in order to gather as much intelligence as possible.
Many threat hunters and incident response firms draw the line at making payments on the dark web, because they won’t – or can’t – operate so far outside their traditional territory. The DAR Team’s “hunt forward” plan offered several new possibilities:
Without a clear picture of the threat actor/s hoping to cash in from the attack, a single purchase might not achieve the desired outcome as it could prematurely cut the investigation short. The company chose instead to start with small payments to the threat actors, hoping for more detailed attribution.
Once goals and methods were agreed on, The DAR Team operatives went to work. Just hours after kickoff, The DAR Team engaged the threat actors to find more information, deploying years-old personas with track records of “trustworthiness” in threat actor marketplaces.
Within 72 hours The DAR Team had discovered:
This information gave the incident response team a new, focused direction:
After this, the incident response team went to work, armed with the intelligence they needed to perform their recovery operations.
The DAR Team cracked the case by tracing out-of-band cryptocurrency transactions.
DAR operatives posed as potential buyers of stolen data. Despite the company’s refusal to pay a ransom demand, they recognized the value of keeping the threat actors engaged. The DAR Team engineered a scenario where the data sellers agreed to a small initial transaction. Though the amount was only enough for a stiff drink or two, this action provided The DAR Team with critical intelligence:
Once The DAR Team uncovered this information, they engaged local law enforcement officials in those countries about this operation. While most ransomware operators are located in countries without extradition treaties such as Russia or other CIS nations, the two unmasked threat actors were not as careful. The information The DAR Team gave to law enforcement ultimately led to their arrests, a rare but welcome triumph.
The tide turned from crisis to victory when the company found The DAR Team.
After two full weeks of their incident response team spinning wheels, expending countless billable hours, and still coming up short, within 72 hours The DAR Team was able to engage the threat actor, gather critical information about the attacks down to the exact location of the access point, identify the threat actors, identify the third party vendor, and provide international law enforcement officials enough information to make arrests and take these threat actors off the market.
The client told The DAR Team that their services were the cheapest part of their incident response bill with the most amount of positive impact.
The DAR team also provided crucial information about this attack to the third party vendor to help them secure their products. The third party received the information, took it seriously, and worked to clean up their product so it could no longer be used as an attack vector.
Why couldn't one of the biggest incident response firms gather the necessary intelligence in two weeks that took The DAR Team 72 hours to discover? Undercover, forward-deployed intelligence.
Established personas. The places where threat actors communicate aren't accessible to just anyone. It takes years of establishing personas, engaging threat actors in the ways they engage each other, and building trust in the communities.
Building this type of intelligence capability out in-house takes years. And companies typically can't risk allowing their employees to engage in these types of dark web spaces and criminal communications – for obvious legal and liability reasons.
The DAR team's forward-deployed intelligence capabilities were on full display during this engagement. This entire operation took place on the dark web and was able to unblock a weeks-long jammed incident response effort, provide details to a third party vendor so more
companies didn't fall victim to this particular threat vector, and provided enough intelligence to law enforcement that led to the takedown of two advanced threat actors – all within 72 hours.
This type of intelligence cannot be found with automated scans or by the layperson. These specialized skills and toolsets are what makes The DAR Team uniquely positioned to act as any company's eyes into what threat actors are actually saying.
Most security tools show you what threat actors want you to see. The DAR Team can find what they're hiding.
Download a full copy of the case study