Case Study: “The Worm – Episode 1”
GROUP ASSINGMENT
Group Members
• Tanushini Bandara – MS18908084
• Jeewanthi Fernando - MS18901290
1
Contents
10/19/2020Case Study: “The Worm – Episode 1”
2
Main incident and motivation.
• The Government Department had an Application Server running an
extremely Critical Application, which processed hundreds of requests a day.
• We were informed that the Critical Application had become non-operational
a few days earlier, and that a large number of service recipients had begun to
queue outside the Office as a result.
10/19/2020Case Study: “The Worm – Episode 1”
3
• The IT team of the Department had identified the situation several days
earlier and had attempted to resolve the issue using internal resources.
• As part of their response, they had used a virus removal tool on the
Application Server to remove files which the Anti Virus software showed
as being infected by a Virus, but the problem persisted.
• The situation had continued to deteriorate, and the senior management
had decided to ask for external assistance.
10/19/2020Case Study: “The Worm – Episode 1”
4
How they identified the real attacker ?
• They initially collected some basic information over the phone and via E-mail from the
official who contacted us to establish a background for the affected Department, so as
to establish contacts and escalation and reporting points within the Department.
10/19/2020Case Study: “The Worm – Episode 1”
5
Other reasons
• The Department’s network was not protected with up-to- date Antivirus software.
• There was no documented Security Policy in place governing such security related
procedures and actions.
• Users were accessing the Application Server system using a common password.
10/19/2020Case Study: “The Worm – Episode 1”
6
The methods they used to carry out the
attack
• Verify that this was indeed an incident.
• Initially collected some basic information over the phone and via E-mail
• Ask four critical questions.
• Gather there are own information's from the victim site
10/19/2020Case Study: “The Worm – Episode 1”
7
Steps they have taken to unmask the real attacker
8
• The presence of the CME-24 was detected on the Application
Server, by the Department’s IT team, under the alias
W32.Blackmal.E.
• Gather there are own information from the victim site.
Case Study: “The Worm – Episode 1” 10/19/2020
Steps they have taken to prove the real
attacker's identity
• Most of the client machines had detected a virus infection in the Shared folder of the
Application Server.
• Analysis of the gathered information began to give us a clear picture of the Department
network setup, and the potential weaknesses that may have led to the incident.
10/19/2020Case Study: “The Worm – Episode 1”
9
The best security practices they can take to avoid future attacks
10
• Ensured that Anti Virus & Operating System software were
regularly updated.
• Access to critical systems was restricted using a strong password
policy.
• Clear audit trails were maintained using system access logs.
Case Study: “The Worm – Episode 1” 10/19/2020
Thank You….
10/19/2020Case Study: “The Worm – Episode 1”
11

More Related Content

PDF
Sensitive Data Exposure Incident Checklist
PDF
Data Leak Protection Using Text Mining and Social Network Analysis
PDF
ARES Next-Gen Risk Management Platform
DOCX
Winchester Aquarium and Pet Center Incident Response Plan
PPTX
Incident response
PPTX
ENISA - EU strategies for cyber incident response
PDF
Incident Response
PDF
Incident Response: How To Prepare
Sensitive Data Exposure Incident Checklist
Data Leak Protection Using Text Mining and Social Network Analysis
ARES Next-Gen Risk Management Platform
Winchester Aquarium and Pet Center Incident Response Plan
Incident response
ENISA - EU strategies for cyber incident response
Incident Response
Incident Response: How To Prepare

Similar to Group assingment (20)

PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
PDF
Current Conditions and Challenges of Cybersecurity in Taiwan
PDF
Incident handling of cyber espionage
PDF
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
PPTX
IRP on a Budget
PDF
Prosecuting Cybercrime and Regulating the Web
PPTX
The Ugly Cost of Cyber Crime
PDF
A Breach Carol: 2013 Review, 2014 Predictions
PPT
Ransomware: Prevention, privacy and your options post-breach
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PPTX
Making Sense of Threat Reports
PDF
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
PPTX
IoT DDoS Attacks: the stakes have changed
PDF
chapter 8- Management Information Systems Managing the Digital Firm
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PPTX
Police CyberAlarm introduction and overview
PPTX
cyber and digital forensics Case study.pptx
What's New In CompTIA Security+ - Course Technology Computing Conference
Current Conditions and Challenges of Cybersecurity in Taiwan
Incident handling of cyber espionage
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
IRP on a Budget
Prosecuting Cybercrime and Regulating the Web
The Ugly Cost of Cyber Crime
A Breach Carol: 2013 Review, 2014 Predictions
Ransomware: Prevention, privacy and your options post-breach
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Making Sense of Threat Reports
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
IoT DDoS Attacks: the stakes have changed
chapter 8- Management Information Systems Managing the Digital Firm
Security Manager - Slides - Module 1 Powerpoint Presentation
Security Manager - Slides - Module 1 Powerpoint Presentation
Security Manager - Slides - Module 1 Powerpoint Presentation
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Police CyberAlarm introduction and overview
cyber and digital forensics Case study.pptx
Ad

More from Jeewanthi Fernando (20)

PDF
Assingment 5 - ENSA
PDF
Assingment 4 - DDos
DOCX
Assingment 3 - Bug bounty
PDF
Assingment 2 - Law
PDF
Assingment 1 - Google haker
PPTX
Ob group presentation
PDF
OB group assignment
PPTX
PPTX
Assignment - Maliban
PDF
Assignment 1
PPTX
BPM presentation
PDF
Business Process Management Doc
PDF
Class activity 5
PDF
Class activity 4
PDF
Class activity 3
PPTX
Professional networking
PDF
Assignment 1
PDF
PDF
ALSS Assingment 1
Assingment 5 - ENSA
Assingment 4 - DDos
Assingment 3 - Bug bounty
Assingment 2 - Law
Assingment 1 - Google haker
Ob group presentation
OB group assignment
Assignment - Maliban
Assignment 1
BPM presentation
Business Process Management Doc
Class activity 5
Class activity 4
Class activity 3
Professional networking
Assignment 1
ALSS Assingment 1
Ad

Recently uploaded (20)

PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
Reproductive system-Human anatomy and physiology
PDF
Compact First Student's Book Cambridge Official
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Everyday Spelling and Grammar by Kathi Wyldeck
Reproductive system-Human anatomy and physiology
Compact First Student's Book Cambridge Official
faiz-khans about Radiotherapy Physics-02.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
M.Tech in Aerospace Engineering | BIT Mesra
Journal of Dental Science - UDMY (2020).pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PUBH1000 - Module 6: Global Health Tute Slides
Thinking Routines and Learning Engagements.pptx
PLASMA AND ITS CONSTITUENTS 123.pptx
Nurlina - Urban Planner Portfolio (english ver)
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
What’s under the hood: Parsing standardized learning content for AI
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
0520_Scheme_of_Work_(for_examination_from_2021).pdf

Group assingment

  • 1. Case Study: “The Worm – Episode 1” GROUP ASSINGMENT Group Members • Tanushini Bandara – MS18908084 • Jeewanthi Fernando - MS18901290 1
  • 2. Contents 10/19/2020Case Study: “The Worm – Episode 1” 2
  • 3. Main incident and motivation. • The Government Department had an Application Server running an extremely Critical Application, which processed hundreds of requests a day. • We were informed that the Critical Application had become non-operational a few days earlier, and that a large number of service recipients had begun to queue outside the Office as a result. 10/19/2020Case Study: “The Worm – Episode 1” 3
  • 4. • The IT team of the Department had identified the situation several days earlier and had attempted to resolve the issue using internal resources. • As part of their response, they had used a virus removal tool on the Application Server to remove files which the Anti Virus software showed as being infected by a Virus, but the problem persisted. • The situation had continued to deteriorate, and the senior management had decided to ask for external assistance. 10/19/2020Case Study: “The Worm – Episode 1” 4
  • 5. How they identified the real attacker ? • They initially collected some basic information over the phone and via E-mail from the official who contacted us to establish a background for the affected Department, so as to establish contacts and escalation and reporting points within the Department. 10/19/2020Case Study: “The Worm – Episode 1” 5
  • 6. Other reasons • The Department’s network was not protected with up-to- date Antivirus software. • There was no documented Security Policy in place governing such security related procedures and actions. • Users were accessing the Application Server system using a common password. 10/19/2020Case Study: “The Worm – Episode 1” 6
  • 7. The methods they used to carry out the attack • Verify that this was indeed an incident. • Initially collected some basic information over the phone and via E-mail • Ask four critical questions. • Gather there are own information's from the victim site 10/19/2020Case Study: “The Worm – Episode 1” 7
  • 8. Steps they have taken to unmask the real attacker 8 • The presence of the CME-24 was detected on the Application Server, by the Department’s IT team, under the alias W32.Blackmal.E. • Gather there are own information from the victim site. Case Study: “The Worm – Episode 1” 10/19/2020
  • 9. Steps they have taken to prove the real attacker's identity • Most of the client machines had detected a virus infection in the Shared folder of the Application Server. • Analysis of the gathered information began to give us a clear picture of the Department network setup, and the potential weaknesses that may have led to the incident. 10/19/2020Case Study: “The Worm – Episode 1” 9
  • 10. The best security practices they can take to avoid future attacks 10 • Ensured that Anti Virus & Operating System software were regularly updated. • Access to critical systems was restricted using a strong password policy. • Clear audit trails were maintained using system access logs. Case Study: “The Worm – Episode 1” 10/19/2020
  • 11. Thank You…. 10/19/2020Case Study: “The Worm – Episode 1” 11