Security Blog

True digital crime E01Pt01: Façade

Unravelling the hijack of a major retailer’s diverse endpoints and network It could have been something out of the “Old West”.  A Threat Actor (TA) cleverly left a major European retailer’s cash registers running with just enough processing capability… and, then, behind that working façade, TA launched a major bitcoin...

Read More

True digital crime E01Pt02: Insiders

Part 2 – unravelling the hijack hack of a major retailer’s diverse endpoints and network cont’d from Part 1 Threat Actor (TA)’s bitcoin-mining breach was methodical, slow and deliberately targeted to the corporation. It unfolded on multiple points. TA’s team took their time. We’ll never know for certain, but the...

Read More

True digital crime E01Pt03: +8 hours

Part 3 – unravelling the hijack hack of a major retailer’s diverse endpoints and network Cont’d from Part 2 Pat [not the person’s real name] It was Friday… 3:50 p.m. Pat – a ReaQta Managed Detection & Response (MDR) Project Manager – had big weekend plans. Well deserved. Hiking boots...

Read More

True digital crime E01Pt04: Response

Part 4 – unravelling the hijack hack of a major retailer’s diverse endpoints and network. Cont’d from Part 3 The Twins They called themselves “T1” and “T2”. The many-times-repeated family story centered on their grandfather. One day he arrived at the house with twin t-shirts. One tee had T1 and the other tee...

Read More