SlideShare a Scribd company logo
1 of 11
Case Study: “The Worm – Episode 1”
GROUP ASSINGMENT
Group Members
• Tanushini Bandara – MS18908084
• Jeewanthi Fernando - MS18901290
1
Contents
10/19/2020Case Study: “The Worm – Episode 1”
2
Main incident and motivation.
• The Government Department had an Application Server running an
extremely Critical Application, which processed hundreds of requests a day.
• We were informed that the Critical Application had become non-operational
a few days earlier, and that a large number of service recipients had begun to
queue outside the Office as a result.
10/19/2020Case Study: “The Worm – Episode 1”
3
• The IT team of the Department had identified the situation several days
earlier and had attempted to resolve the issue using internal resources.
• As part of their response, they had used a virus removal tool on the
Application Server to remove files which the Anti Virus software showed
as being infected by a Virus, but the problem persisted.
• The situation had continued to deteriorate, and the senior management
had decided to ask for external assistance.
10/19/2020Case Study: “The Worm – Episode 1”
4
How they identified the real attacker ?
• They initially collected some basic information over the phone and via E-mail from the
official who contacted us to establish a background for the affected Department, so as
to establish contacts and escalation and reporting points within the Department.
10/19/2020Case Study: “The Worm – Episode 1”
5
Other reasons
• The Department’s network was not protected with up-to- date Antivirus software.
• There was no documented Security Policy in place governing such security related
procedures and actions.
• Users were accessing the Application Server system using a common password.
10/19/2020Case Study: “The Worm – Episode 1”
6
The methods they used to carry out the
attack
• Verify that this was indeed an incident.
• Initially collected some basic information over the phone and via E-mail
• Ask four critical questions.
• Gather there are own information's from the victim site
10/19/2020Case Study: “The Worm – Episode 1”
7
Steps they have taken to unmask the real attacker
8
• The presence of the CME-24 was detected on the Application
Server, by the Department’s IT team, under the alias
W32.Blackmal.E.
• Gather there are own information from the victim site.
Case Study: “The Worm – Episode 1” 10/19/2020
Steps they have taken to prove the real
attacker's identity
• Most of the client machines had detected a virus infection in the Shared folder of the
Application Server.
• Analysis of the gathered information began to give us a clear picture of the Department
network setup, and the potential weaknesses that may have led to the incident.
10/19/2020Case Study: “The Worm – Episode 1”
9
The best security practices they can take to avoid future attacks
10
• Ensured that Anti Virus & Operating System software were
regularly updated.
• Access to critical systems was restricted using a strong password
policy.
• Clear audit trails were maintained using system access logs.
Case Study: “The Worm – Episode 1” 10/19/2020
Thank You….
10/19/2020Case Study: “The Worm – Episode 1”
11

More Related Content

Similar to Group assingment

Similar to Group assingment (20)

What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Current Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in TaiwanCurrent Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in Taiwan
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a Budget
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
YUDU - Managing a Breach (LDSC Cyber Themed Evening)YUDU - Managing a Breach (LDSC Cyber Themed Evening)
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore
Top 3 MAC Spoofing Challenges You Cannot Afford to IgnoreTop 3 MAC Spoofing Challenges You Cannot Afford to Ignore
Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 

More from Jeewanthi Fernando

More from Jeewanthi Fernando (20)

Assingment 5 - ENSA
Assingment 5 - ENSAAssingment 5 - ENSA
Assingment 5 - ENSA
 
Assingment 4 - DDos
Assingment 4 - DDosAssingment 4 - DDos
Assingment 4 - DDos
 
Assingment 3 - Bug bounty
Assingment 3 - Bug bountyAssingment 3 - Bug bounty
Assingment 3 - Bug bounty
 
Assingment 2 - Law
Assingment 2 - LawAssingment 2 - Law
Assingment 2 - Law
 
Assingment 1 - Google haker
Assingment 1 - Google hakerAssingment 1 - Google haker
Assingment 1 - Google haker
 
Ob group presentation
Ob group presentationOb group presentation
Ob group presentation
 
OB group assignment
OB group assignmentOB group assignment
OB group assignment
 
Poster
PosterPoster
Poster
 
Assignment - Maliban
Assignment - MalibanAssignment - Maliban
Assignment - Maliban
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
BPM presentation
BPM presentationBPM presentation
BPM presentation
 
Business Process Management Doc
Business Process Management DocBusiness Process Management Doc
Business Process Management Doc
 
Class activity 5
Class activity 5   Class activity 5
Class activity 5
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Class activity 3
Class activity 3   Class activity 3
Class activity 3
 
Professional networking
Professional networkingProfessional networking
Professional networking
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Tesco doc
Tesco docTesco doc
Tesco doc
 
Tesco
TescoTesco
Tesco
 
ALSS Assingment 1
ALSS Assingment 1ALSS Assingment 1
ALSS Assingment 1
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Group assingment

  • 1. Case Study: “The Worm – Episode 1” GROUP ASSINGMENT Group Members • Tanushini Bandara – MS18908084 • Jeewanthi Fernando - MS18901290 1
  • 2. Contents 10/19/2020Case Study: “The Worm – Episode 1” 2
  • 3. Main incident and motivation. • The Government Department had an Application Server running an extremely Critical Application, which processed hundreds of requests a day. • We were informed that the Critical Application had become non-operational a few days earlier, and that a large number of service recipients had begun to queue outside the Office as a result. 10/19/2020Case Study: “The Worm – Episode 1” 3
  • 4. • The IT team of the Department had identified the situation several days earlier and had attempted to resolve the issue using internal resources. • As part of their response, they had used a virus removal tool on the Application Server to remove files which the Anti Virus software showed as being infected by a Virus, but the problem persisted. • The situation had continued to deteriorate, and the senior management had decided to ask for external assistance. 10/19/2020Case Study: “The Worm – Episode 1” 4
  • 5. How they identified the real attacker ? • They initially collected some basic information over the phone and via E-mail from the official who contacted us to establish a background for the affected Department, so as to establish contacts and escalation and reporting points within the Department. 10/19/2020Case Study: “The Worm – Episode 1” 5
  • 6. Other reasons • The Department’s network was not protected with up-to- date Antivirus software. • There was no documented Security Policy in place governing such security related procedures and actions. • Users were accessing the Application Server system using a common password. 10/19/2020Case Study: “The Worm – Episode 1” 6
  • 7. The methods they used to carry out the attack • Verify that this was indeed an incident. • Initially collected some basic information over the phone and via E-mail • Ask four critical questions. • Gather there are own information's from the victim site 10/19/2020Case Study: “The Worm – Episode 1” 7
  • 8. Steps they have taken to unmask the real attacker 8 • The presence of the CME-24 was detected on the Application Server, by the Department’s IT team, under the alias W32.Blackmal.E. • Gather there are own information from the victim site. Case Study: “The Worm – Episode 1” 10/19/2020
  • 9. Steps they have taken to prove the real attacker's identity • Most of the client machines had detected a virus infection in the Shared folder of the Application Server. • Analysis of the gathered information began to give us a clear picture of the Department network setup, and the potential weaknesses that may have led to the incident. 10/19/2020Case Study: “The Worm – Episode 1” 9
  • 10. The best security practices they can take to avoid future attacks 10 • Ensured that Anti Virus & Operating System software were regularly updated. • Access to critical systems was restricted using a strong password policy. • Clear audit trails were maintained using system access logs. Case Study: “The Worm – Episode 1” 10/19/2020
  • 11. Thank You…. 10/19/2020Case Study: “The Worm – Episode 1” 11