With Digital Shadows SearchLight™, the IT security manager of a bank discovered a configuration file that indicated a banking trojan was targeting their customers.
Learn more at https://resources.digitalshadows.com/
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Configuration File of Trojan Targets Organization
1. Use Case
Configuration File of Trojan Targets Organization
www.digitalshadows.com
With Digital Shadows SearchLight™, the IT security
manager of a bank discovered a configuration file
that indicated a banking trojan was targeting their
customers. They needed to understand more details
about the malware, in order to assess the impact of
the targeting.
Given the trojan’s success in targeting organizations in
other regions, the company’s customers were at risk of
having their credentials harvested and their accounts accessed. This could ultimately lead to reputa-
tional damage, revenue and margin implications, as well as a risk to customers’ information.
w
l Shadows SearchLight™, the IT security manager of a bank
a configuration file that indicated a banking trojan was
heir customers. They needed to understand more details about
re, in order to assess the impact of the targeting.
rojan’s success in targeting organizations in other regions, the
customers were at risk of having their credentials harvested
ccounts accessed. This could ultimately lead to reputational
evenue and margin implications, as well as a risk to customers’
n.
anization
Shadows SearchLightTM
We Did
Risk Detected
By monitoring our sources for mentions of domain names and IP ranges, Digital Shadows
SearchLight™ detected posts on Pastebin of the configuration files for the Trickbot trojan, which
revealed that the company’s customers were likely to be targeted.
Analyst Reviews and Adds Context
Digital Shadows analyst team verified the incident, and provided an analysis of the tool’s features
and capabilities, including targets, delivery method and activity levels.
Risk Managed
Digital Shadows sent the company an alert the morning it occurred with recommended steps to
take action. The bank was able to inform their customers of the added risk and provide them with
advice on how to protect themselves.
Paste Sites Social Media Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P
bout Digital Shadows
gital Shadows monitors and manages an
ganization’s digital risk across the widest range of data
urces within the visible, deep, and dark web to protect
organization’s business, brand, and reputation.
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
U.S. Headquarters Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLight™, the IT security manager of a bank
discovered a configuration file that indicated a banking trojan was
targeting their customers. They needed to understand more details about
the malware, in order to assess the impact of the targeting.
Given the trojan’s success in targeting organizations in other regions, the
company’s customers were at risk of having their credentials harvested
and their accounts accessed. This could ultimately lead to reputational
damage, revenue and margin implications, as well as a risk to customers’
information.
Configuration File of Trojan Targets
Organization
Digital Shadows SearchLightTM
What We Did
Risk Detected
By monitoring our sources for mentions of domain names and IP ranges, Digital Shadows
SearchLight™ detected posts on Pastebin of the configuration files for the Trickbot trojan, which
revealed that the company’s customers were likely to be targeted.
Analyst Reviews and Adds Context
Digital Shadows analyst team verified the incident, and provided an analysis of the tool’s features
and capabilities, including targets, delivery method and activity levels.
Risk Managed
Digital Shadows sent the company an alert the morning it occurred with recommended steps to
take action. The bank was able to inform their customers of the added risk and provide them with
advice on how to protect themselves.
Code-sharing Paste Sites Social Media Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P
About Digital Shadows
Digital Shadows monitors and manages an
organization’s digital risk across the widest range of data
sources within the visible, deep, and dark web to protect
an organization’s business, brand, and reputation.
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
About Digital Shadows
Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business
and brand. We monitor for digital risk across the broadest range of data sources within the open, deep and dark web
to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be
more effective and efficient. Our clients can focus on growing their core business knowing that they are protected if
their data is exposed, employees and third parties put them at risk, or their brand is being misused. To learn more,
visit www.digitalshadows.com.
Email: info@digitalshadows.com
U.S. Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Call us at 1-888-889-4143
UK +44 (0)203 393 7001
U.S. Headquarters
Digital Shadows, Inc. North American Intelligence Operations Hub
UK Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
www.digitalshadows.com
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Digital Shadows SearchLight™ What We Did