Bridgehead IT was working with a long-time client to implement a recommended solution to improve their security; End-Point Detection and Response (EDR)/ Extended Detection and Response (XDR). Bridgehead IT works as a partner with its clients to provide technology solutions that are tailored to business needs. As technology and threats change, Bridgehead IT and its team of experts are there to advise on best practices.
While deploying MDR/XDR Bridgehead IT noticed suspicious activity. Swiftly, Bridgehead IT alerted key team members within the client’s organization to assess the scope of the threat. Through email phishing it was determined that the attackers gained access to critical administrators-level systems, and disabled antivirus programs. The threat actors then moved laterally throughout the network targeting servers, workstations, and exfiltrating data. Once the scope of the threat was ascertained by the incident response team, steps to eradicate the threats and data-recovery were initiated.
Among the key aspects of the recovery effort were terminating critical access points, requiring password changes through all systems, and rebuilding impacted servers and workstations. Targeted malware removal was used to further ensure hardware was clean. Location-based GEO-IP filtering rules, layered segmentation of domains, and LAN-side capture utility were incorporated into security appliance hardening. Images and artifacts were then prepared for the forensics team.
Due to the diligent, quick actions of the incident response team, it was found the client was attacked by ransomware. Once infected, the malware will spread across the network, affecting both the server and workstation environments, but the threat actors were caught prior to this happening.