Dtex Systems > Case Studies > Protecting Trusted Insiders

Protecting Trusted Insiders

Dtex Systems Logo
Company Size
1,000+
Product
  • DTEX Workforce Cyber Intelligence Platform
Tech Stack
  • Cybersecurity
  • Phishing Detection
  • User Behavior Analysis
Implementation Scale
  • Enterprise-wide Deployment
Technology Category
  • Cybersecurity & Privacy - Network Security
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cybersecurity Services
About The Customer
The customer is a large energy organization with 3,000 employees. The company was the victim of a phishing attack, which occurred due to the failure of perimeter security. The phishing emails managed to penetrate the company's network defense system and landed straight into employee inboxes. A proxy service eventually detected and flagged that users had visited malicious URLs, but there was limited visibility into where and how the attackers entered the network, the number of users affected, and the extent of the potential damage.
The Challenge
The enterprise security threat landscape is more complex than ever, with new risks and attack methods emerging faster than we can keep up with them. One established attack vector that shows no signs of slowing down is phishing. As phishing attacks have become more sophisticated, they're increasingly focused on exploiting a key, but often overlooked, vulnerability: the users inside of your network. It is user behavior - the opening, the clicking, the downloading - that serves as the enabler, allowing malicious actors to gain entry to your network and find the valuable personal or company information they're seeking. Recently, a slew of invoice-themed malicious phishing emails was found to have penetrated a customer network - past a tried-and-true network defense system and straight into employee inboxes. A proxy service eventually detected and flagged that users had visited malicious URLs, but there was limited visibility into where and how the attackers entered the network, the number of users affected, and the extent of the potential damage.
The Solution
DTEX's Workforce Cyber Intelligence Platform was used to provide critical insights and answer important questions enabling the security team to fully understand the origin and trajectory of the attack, and pinpoint affected users and endpoints. The platform was able to uncover evidence of advanced techniques commonly leveraged to avoid detection and successfully infiltrate employee inboxes. One such technique was the use of polymorphism, including dynamic email subject lines, URLs, document names, and executed payloads. Additionally, the links contained within the phishing emails were found to be addresses of actual company sites that had been compromised and used as transient locations to host malicious documents. DTEX's platform was able to provide answers to critical questions such as which users opened the malicious email, which users clicked on the malicious link or downloaded the attachment, when did the malicious email enter the organization, and which endpoints are potentially compromised.
Operational Impact
  • Provided critical insights into the origin and trajectory of the phishing attack.
  • Pinpointed affected users and endpoints.
  • Uncovered evidence of advanced techniques used to avoid detection and infiltrate employee inboxes.
  • Identified the use of polymorphism in the phishing attack.
  • Discovered that the links in the phishing emails were addresses of actual company sites that had been compromised.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.