PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701
WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | CV@proteuseng.com
1
INTRODUCTION
A mid-sized defense contractor found itself the victim of a
relatively new variant of a cyber-attack, called CryptoLocker.
CryptoLocker is a variant of a ransomware trojan targeting
computers running Microsoft Windows. CryptoLocker
propagates via email attachments, or simply by an end-user
surfing the internet. It can strike at any time. When active,
CryptoLocker encrypts all files stored on local and mapped
network drives making it virtually impossible to reestablish
the original content, without the ransom paid in bitcoins to an
anonymous account.
CryptoLocker subverted the contractor’s existing security
controls, including internal IDS/IPS, webfilter gateway, and
antivirus endpoint protection entirely due to the zero day
nature of the ransomware variant.
Industry
Defense Contractor
Challenge
Eliminate ransomware infection and prevent
future reoccurance
Environment
One server room with 150 endpoints
deployed with anti-virus, webfilters, and
IDS/IPS solution
Results
1.	 Recovered and restored business
operations in just hours
2.	 Gained deep visibility into origin of the
attack and status of all endpoints
3.	 Saved hours of time and associated
costs
RANSOMWARE VARIANTS:
Cyrptolocker, CryptoWall, TorrentLocker, Gameover ZeuS, TeslaCrypt, Linux.Encoder.1, Filecoder.A, Trojan.
Linux.Ransom.A
“41% of those who claimed to be victims said that they decided to pay the ransom, as
they could not adequately recover files which had been backed up. It is believed the
ransomware extorted a total of around $3 million.”	
	 	 -Researchers at the University of Kent
CryptoLocker Ransomware Infection
Defense Contractor solves ransomware infection and gains reassurance of complete
and continuous visibility over potential operational risks.
CASE STUDY
PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701
WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | CV@proteuseng.com
2
RESULTS
Within two hours of the CyptoLocker attack first being identified, CyberVigilance™ engineers remediated
and restored all files, network traffic, and briefed senior management on the event. The defense contractor
was back to business thanks to CyberVigiliance™.
SOLUTION
RESEARCH: INCIDENT MANIFESTATION
PROTEUS’ CyberVigilance™ solution was able to discover the infection before it encrypted many of the
files on the defense contractor’s corporate network. Initial detection occurred when alerts of increased
anomalous and external traffic were seen in the CyberVigilance™ Operations Center (CVOC). Additionally
trouble tickets were beginning to hit the helpdesk as employees were beginning to notice out-of-place files
while reviewing documents on their file shares.
REMEDIATE: INCIDENT CONTAINMENT
To contain the damage caused by CryptoLocker, the CVOC immediately contacted the company’s IT staff and
requested for them to temporarily shut down internal network access. This measure was enacted in order
to prevent the spread of the ransomware, stop the encryption of files on the network shares, and to prevent
any additional outbound command and control activity.
This action immediately stopped the anomalous traffic allowing CVOC engineers to begin the investigation
of the incident. Leveraging several of the centralized logging and analytic tools that are part of the
CyberVigilance™ solution, CVOC engineers were quickly able to pinpoint the source of the infection.
RESPOND: INCIDENT RESPONSE AND RESTORATION
The investigation revealed a single infected computer system. The offending workstation was physically
removed from the network and quarantined for future analysis.
At that point PROTEUS’ CVOC engineers worked directly with the company’s IT staff to meticulously scan
every system connected to the network to ensure that the CryptoLocker ransomware or any other variants
were contained and removed if discovered. Once the scans were completed, it was determined that the
CyberVigilance™ solution provided the evidence needed to ensure that 100% of the attack had been
contained and remediated.
Following containment, network access was restored and the company’s IT staff began their internal process
of restoring files from backup, and tightened web-filter protocols.
CASE STUDY
CryptoLocker Ransomware Infection
PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701
WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | CV@proteuseng.com
3
CONCLUSION
It is critical to continuously monitor and alert on suspicious network activity, as in this example, on the
creation of filenames associated with malware or renaming of large numbers of files in a short time.
Using CyberVigilance™, the company was reassured that had complete and continuous visibility over the
potential operational risks security threats post to their internal systems. CyberVigilance™ enabled the
company to restore network access and business operations much faster than had they analyzed data using
traditional methods.
RESEARCH RESPONDREMEDIATE
About PROTEUS Technologies
PROTEUS Technologies, LLC (PROTEUS), is a leading provider of high-end Cyber Solutions, SIGINT and Technology, Research & Innovation,
and Embedded Engineering software services to the Intelligence Community, Federal Executive Departments, HealthCare, and Commercial
Industries. PROTEUS has a proven track record of excellence and commitment to client mission success. PROTEUS Headquarters is located
in Annapolis Junction, MD with satellite offices in Columbia, MD, and is the 2010 winner of the prestigious DoD Nunn-Perry Award winner,
multiple annual Baltimore Business Journal “Best Places to Work” awards, and the most recent Corporate America Software & Technology
Award Winner for Innovation in Software/Systems Engineering.
#ACTB4URHACKD
A PROTEUS TECHNOLOGIES CYBER SOLUTION
CyberVigilance
™
“CryptoLocker’s creators are almost certainly seasoned in malware campaigns that
appear to have made sound design decisions that complicate efforts to mitigate this
threat and have demonstrated a capable distribution system based on the Cutwail
and Gameover Zeus botnets.”
			-Dell SecureWorks
CASE STUDY
CryptoLocker Ransomware Infection

More Related Content

PDF
Trisis in Perspective: Implications for ICS Defenders
PDF
Supply chain-attack
PPTX
Chris Haley - Understanding Attackers' Use of Covert Communications
PDF
INTRODUCTION TO CYBER FORENSICS
PPTX
TRISIS in Perspective
PPTX
S4 krotofil afternoon_sesh_2017
PPTX
Incident Response: Validation, Containment & Forensics
PDF
Splunk for Security
Trisis in Perspective: Implications for ICS Defenders
Supply chain-attack
Chris Haley - Understanding Attackers' Use of Covert Communications
INTRODUCTION TO CYBER FORENSICS
TRISIS in Perspective
S4 krotofil afternoon_sesh_2017
Incident Response: Validation, Containment & Forensics
Splunk for Security

What's hot (20)

PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
PDF
Security Testing ModernApps_v1.0
PPTX
Netpluz - Managed Firewall & Endpoint Protection
PDF
RSA Anatomy of an Attack
PDF
The Dynamic Nature of Virtualization Security
PPTX
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
PPTX
Debunking the Hacker Hype: The Reality of Widespread Blackouts
PPTX
Pragmatic intelsans intelsummit2014
PPTX
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
PPTX
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
PDF
Cyber Security - IDS/IPS is not enough
PPTX
Dragos year in review (yir) 2018
PPT
Secure by design and secure software development
PDF
DTS Solution - Penetration Testing Services v1.0
PPTX
What is Next-Generation Antivirus?
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
PPTX
Kent King - PKI: Do You Know Your Exposure?
PDF
Combating Advanced Persistent Threats with Flow-based Security Monitoring
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Security Testing ModernApps_v1.0
Netpluz - Managed Firewall & Endpoint Protection
RSA Anatomy of an Attack
The Dynamic Nature of Virtualization Security
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Pragmatic intelsans intelsummit2014
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Cyber Security - IDS/IPS is not enough
Dragos year in review (yir) 2018
Secure by design and secure software development
DTS Solution - Penetration Testing Services v1.0
What is Next-Generation Antivirus?
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Kent King - PKI: Do You Know Your Exposure?
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Ad

Viewers also liked (13)

DOC
HelenBohrer resume
DOCX
ElizabethMWhiteResume 081916
PPSX
Benim Evim Sosyal Medya
PDF
Evidence 2 My Daily Routine
PPT
Secrets of success
DOCX
Thức ăn Bổ Xương Khớp
PDF
Ensayo sobre los Diseñadores Graficos Venezolanos e internacionales.
PPTX
Власенко
PPT
Введение в естествознание
PPSX
Present perfect i have just completed
PPTX
A3. MEP 1 - Mod 1 - Tema3
PDF
Amcham Physician Jan15
PDF
Uttrykkshistorie
HelenBohrer resume
ElizabethMWhiteResume 081916
Benim Evim Sosyal Medya
Evidence 2 My Daily Routine
Secrets of success
Thức ăn Bổ Xương Khớp
Ensayo sobre los Diseñadores Graficos Venezolanos e internacionales.
Власенко
Введение в естествознание
Present perfect i have just completed
A3. MEP 1 - Mod 1 - Tema3
Amcham Physician Jan15
Uttrykkshistorie
Ad

Similar to CV_case-study_cryptolocker_web (20)

PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PPTX
How cybercrime affects small business
PDF
A Secure Network Bridging the Gap
PDF
FBI Memo on How to Protect Yourself from Ransomware
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PDF
Oh... that's ransomware and... look behind you a three-headed Monkey
DOCX
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
PDF
CTI Report
PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
PPTX
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
PDF
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
PPTX
Advanced Threats In The Enterprise
PDF
Dell EMC Cyber Recovery protected our test data from a cyber attack - Infogra...
PPTX
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
PDF
Ransomware ly
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
Defend Your Company Against Ransomware
PPT
Chapter1 intro network_security_sunorganised
PDF
Cyber security and cyber law
Recover your files from Ransomware - Ransomware Incident Response by Tictac
How cybercrime affects small business
A Secure Network Bridging the Gap
FBI Memo on How to Protect Yourself from Ransomware
Understanding CryptoLocker (Ransomware) with a Case Study
Oh... that's ransomware and... look behind you a three-headed Monkey
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
CTI Report
What's New In CompTIA Security+ - Course Technology Computing Conference
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
Advanced Threats In The Enterprise
Dell EMC Cyber Recovery protected our test data from a cyber attack - Infogra...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Ransomware ly
Disruptionware-TRustedCISO103020v0.7.pptx
Defend Your Company Against Ransomware
Chapter1 intro network_security_sunorganised
Cyber security and cyber law

CV_case-study_cryptolocker_web

  • 1. PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701 WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | [email protected] 1 INTRODUCTION A mid-sized defense contractor found itself the victim of a relatively new variant of a cyber-attack, called CryptoLocker. CryptoLocker is a variant of a ransomware trojan targeting computers running Microsoft Windows. CryptoLocker propagates via email attachments, or simply by an end-user surfing the internet. It can strike at any time. When active, CryptoLocker encrypts all files stored on local and mapped network drives making it virtually impossible to reestablish the original content, without the ransom paid in bitcoins to an anonymous account. CryptoLocker subverted the contractor’s existing security controls, including internal IDS/IPS, webfilter gateway, and antivirus endpoint protection entirely due to the zero day nature of the ransomware variant. Industry Defense Contractor Challenge Eliminate ransomware infection and prevent future reoccurance Environment One server room with 150 endpoints deployed with anti-virus, webfilters, and IDS/IPS solution Results 1. Recovered and restored business operations in just hours 2. Gained deep visibility into origin of the attack and status of all endpoints 3. Saved hours of time and associated costs RANSOMWARE VARIANTS: Cyrptolocker, CryptoWall, TorrentLocker, Gameover ZeuS, TeslaCrypt, Linux.Encoder.1, Filecoder.A, Trojan. Linux.Ransom.A “41% of those who claimed to be victims said that they decided to pay the ransom, as they could not adequately recover files which had been backed up. It is believed the ransomware extorted a total of around $3 million.” -Researchers at the University of Kent CryptoLocker Ransomware Infection Defense Contractor solves ransomware infection and gains reassurance of complete and continuous visibility over potential operational risks. CASE STUDY
  • 2. PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701 WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | [email protected] 2 RESULTS Within two hours of the CyptoLocker attack first being identified, CyberVigilance™ engineers remediated and restored all files, network traffic, and briefed senior management on the event. The defense contractor was back to business thanks to CyberVigiliance™. SOLUTION RESEARCH: INCIDENT MANIFESTATION PROTEUS’ CyberVigilance™ solution was able to discover the infection before it encrypted many of the files on the defense contractor’s corporate network. Initial detection occurred when alerts of increased anomalous and external traffic were seen in the CyberVigilance™ Operations Center (CVOC). Additionally trouble tickets were beginning to hit the helpdesk as employees were beginning to notice out-of-place files while reviewing documents on their file shares. REMEDIATE: INCIDENT CONTAINMENT To contain the damage caused by CryptoLocker, the CVOC immediately contacted the company’s IT staff and requested for them to temporarily shut down internal network access. This measure was enacted in order to prevent the spread of the ransomware, stop the encryption of files on the network shares, and to prevent any additional outbound command and control activity. This action immediately stopped the anomalous traffic allowing CVOC engineers to begin the investigation of the incident. Leveraging several of the centralized logging and analytic tools that are part of the CyberVigilance™ solution, CVOC engineers were quickly able to pinpoint the source of the infection. RESPOND: INCIDENT RESPONSE AND RESTORATION The investigation revealed a single infected computer system. The offending workstation was physically removed from the network and quarantined for future analysis. At that point PROTEUS’ CVOC engineers worked directly with the company’s IT staff to meticulously scan every system connected to the network to ensure that the CryptoLocker ransomware or any other variants were contained and removed if discovered. Once the scans were completed, it was determined that the CyberVigilance™ solution provided the evidence needed to ensure that 100% of the attack had been contained and remediated. Following containment, network access was restored and the company’s IT staff began their internal process of restoring files from backup, and tightened web-filter protocols. CASE STUDY CryptoLocker Ransomware Infection
  • 3. PROTEUS TECHNOLOGIES | 133 National Business Parkway, Suite 150 | Annapolis Junction, Maryland 20701 WWW.PROTEUS-TECHNOLOGIES.COM/CYBERVIGILANCE | [email protected] 3 CONCLUSION It is critical to continuously monitor and alert on suspicious network activity, as in this example, on the creation of filenames associated with malware or renaming of large numbers of files in a short time. Using CyberVigilance™, the company was reassured that had complete and continuous visibility over the potential operational risks security threats post to their internal systems. CyberVigilance™ enabled the company to restore network access and business operations much faster than had they analyzed data using traditional methods. RESEARCH RESPONDREMEDIATE About PROTEUS Technologies PROTEUS Technologies, LLC (PROTEUS), is a leading provider of high-end Cyber Solutions, SIGINT and Technology, Research & Innovation, and Embedded Engineering software services to the Intelligence Community, Federal Executive Departments, HealthCare, and Commercial Industries. PROTEUS has a proven track record of excellence and commitment to client mission success. PROTEUS Headquarters is located in Annapolis Junction, MD with satellite offices in Columbia, MD, and is the 2010 winner of the prestigious DoD Nunn-Perry Award winner, multiple annual Baltimore Business Journal “Best Places to Work” awards, and the most recent Corporate America Software & Technology Award Winner for Innovation in Software/Systems Engineering. #ACTB4URHACKD A PROTEUS TECHNOLOGIES CYBER SOLUTION CyberVigilance ™ “CryptoLocker’s creators are almost certainly seasoned in malware campaigns that appear to have made sound design decisions that complicate efforts to mitigate this threat and have demonstrated a capable distribution system based on the Cutwail and Gameover Zeus botnets.” -Dell SecureWorks CASE STUDY CryptoLocker Ransomware Infection