{"id":16,"date":"2026-05-03T18:19:01","date_gmt":"2026-05-03T18:19:01","guid":{"rendered":"https:\/\/student.wp.odu.edu\/pdamt001\/?p=16"},"modified":"2026-05-03T18:19:04","modified_gmt":"2026-05-03T18:19:04","slug":"skill-2-threat-analysis-incident-response","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/pdamt001\/2026\/05\/03\/skill-2-threat-analysis-incident-response\/","title":{"rendered":"SKILL 2: THREAT ANALYSIS &amp; INCIDENT RESPONSE"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 4 \u2014 Threat Analysis Report: Phishing Campaign Targeting Corporate Email<\/h2>\n\n\n\n<p><strong>Course Context:<\/strong>&nbsp;Cyber Threat Intelligence&nbsp;<strong>Date:<\/strong>&nbsp;Spring 2024<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Executive Summary<\/h3>\n\n\n\n<p>This report analyzes a spear-phishing campaign identified targeting employees of mid-sized financial services organizations. The campaign used carefully crafted emails impersonating internal IT departments to harvest employee credentials. This analysis covers the attack methodology, indicators of compromise, threat actor assessment, and recommended mitigations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Overview<\/h3>\n\n\n\n<p><strong>Threat Type:<\/strong>&nbsp;Spear-phishing \/ Credential harvesting&nbsp;<strong>Target Sector:<\/strong>&nbsp;Financial services&nbsp;<strong>Likely Motivation:<\/strong>&nbsp;Financial gain \/ Initial access for follow-on attack&nbsp;<strong>Sophistication Level:<\/strong>&nbsp;Moderate to high<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Methodology<\/h3>\n\n\n\n<p>The campaign followed a structured attack chain:<\/p>\n\n\n\n<p><strong>Phase 1 \u2014 Reconnaissance<\/strong>&nbsp;Attackers gathered employee information from LinkedIn and company websites to identify targets with access to financial systems. Job titles such as &#8220;Accounts Payable Specialist&#8221; and &#8220;Finance Manager&#8221; were specifically targeted.<\/p>\n\n\n\n<p><strong>Phase 2 \u2014 Email Crafting<\/strong>&nbsp;Phishing emails were sent from domains that closely resembled legitimate company domains (e.g., company-it-support.com vs. company.com). Emails warned recipients that their passwords were expiring and directed them to click a link to update their credentials.<\/p>\n\n\n\n<p><strong>Phase 3 \u2014 Credential Harvesting<\/strong>&nbsp;The link directed users to a convincing replica of the company&#8217;s login portal. Credentials entered on the page were captured and transmitted to attacker-controlled infrastructure.<\/p>\n\n\n\n<p><strong>Phase 4 \u2014 Account Exploitation<\/strong>&nbsp;Harvested credentials were used to access email accounts, from which attackers sought financial information, wire transfer instructions, and contact lists for further targeting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Indicators of Compromise (IOCs)<\/h3>\n\n\n\n<ul>\n<li>Sending domains: company-it-helpdesk[.]com, it-support-portal[.]net<\/li>\n\n\n\n<li>Subject lines: &#8220;Action Required: Password Expiration Notice,&#8221; &#8220;Immediate Action: Account Security Alert&#8221;<\/li>\n\n\n\n<li>Phishing page IP: 185.234.xx.xx (hosted on bulletproof hosting provider)<\/li>\n\n\n\n<li>User-agent string associated with credential harvesting tool<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Actor Assessment<\/h3>\n\n\n\n<p>Based on the targeting pattern, infrastructure characteristics, and techniques used, this campaign is consistent with financially motivated threat actors operating in Eastern Europe. The use of bulletproof hosting and the targeting of finance personnel is consistent with Business Email Compromise (BEC) groups documented by the FBI&#8217;s Internet Crime Complaint Center (IC3).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended Mitigations<\/h3>\n\n\n\n<ol>\n<li>Implement multi-factor authentication on all email accounts immediately<\/li>\n\n\n\n<li>Deploy email filtering solutions with domain similarity detection<\/li>\n\n\n\n<li>Conduct employee security awareness training with emphasis on phishing recognition<\/li>\n\n\n\n<li>Implement DMARC, DKIM, and SPF email authentication protocols<\/li>\n\n\n\n<li>Monitor for login attempts from unusual geographic locations or IP addresses<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 5 \u2014 Incident Response Plan: Ransomware Incident<\/h2>\n\n\n\n<p><strong>Course Context:<\/strong>&nbsp;Incident Response and Digital Forensics&nbsp;<strong>Date:<\/strong>&nbsp;Spring 2024<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Purpose<\/h3>\n\n\n\n<p>This Incident Response Plan (IRP) provides structured guidance for responding to a ransomware incident affecting organizational systems. It is designed to minimize damage, preserve evidence, restore operations, and prevent recurrence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incident Response Team<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Role<\/th><th>Responsibility<\/th><\/tr><\/thead><tbody><tr><td>Incident Response Lead<\/td><td>Overall coordination and decision-making<\/td><\/tr><tr><td>Security Analyst<\/td><td>Technical investigation and containment<\/td><\/tr><tr><td>IT Operations<\/td><td>System isolation and recovery<\/td><\/tr><tr><td>Legal\/Compliance<\/td><td>Regulatory notification and documentation<\/td><\/tr><tr><td>Communications Lead<\/td><td>Internal and external communications<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Phase 1 \u2014 Detection and Identification<\/h3>\n\n\n\n<p><strong>Triggers that may indicate ransomware:<\/strong><\/p>\n\n\n\n<ul>\n<li>Files with unfamiliar extensions appearing on shared drives<\/li>\n\n\n\n<li>Ransom note files appearing on desktops or shared folders<\/li>\n\n\n\n<li>Sudden inability to open files<\/li>\n\n\n\n<li>Unusual encryption activity detected by endpoint security tools<\/li>\n\n\n\n<li>Help desk calls from multiple users reporting the same issue<\/li>\n<\/ul>\n\n\n\n<p><strong>Immediate Actions:<\/strong><\/p>\n\n\n\n<ol>\n<li>Document the time, date, and nature of the alert<\/li>\n\n\n\n<li>Identify affected systems and users<\/li>\n\n\n\n<li>Preserve logs from affected systems before any remediation<\/li>\n\n\n\n<li>Notify the Incident Response Lead immediately<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase 2 \u2014 Containment<\/h3>\n\n\n\n<p><strong>Short-term containment (within 1 hour):<\/strong><\/p>\n\n\n\n<ol>\n<li>Isolate affected systems from the network by disabling network interfaces or physically disconnecting network cables<\/li>\n\n\n\n<li>Do NOT power off affected systems \u2014 live memory may contain decryption keys or attacker artifacts<\/li>\n\n\n\n<li>Block identified malicious IP addresses and domains at the firewall<\/li>\n\n\n\n<li>Disable affected user accounts to prevent further spread via compromised credentials<\/li>\n<\/ol>\n\n\n\n<p><strong>Long-term containment:<\/strong><\/p>\n\n\n\n<ol>\n<li>Identify the initial infection vector (phishing email, exposed RDP, vulnerable software)<\/li>\n\n\n\n<li>Patch or remediate the identified vulnerability<\/li>\n\n\n\n<li>Scan all systems for indicators of compromise<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase 3 \u2014 Eradication<\/h3>\n\n\n\n<ol>\n<li>Identify all systems affected by the ransomware<\/li>\n\n\n\n<li>Remove malware using endpoint security tools and manual remediation<\/li>\n\n\n\n<li>Rebuild systems from known-good images where full eradication cannot be confirmed<\/li>\n\n\n\n<li>Reset all passwords, prioritizing accounts with elevated privileges<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase 4 \u2014 Recovery<\/h3>\n\n\n\n<ol>\n<li>Restore data from clean backups verified to predate the infection<\/li>\n\n\n\n<li>Bring systems back online in a staged manner, monitoring closely for signs of reinfection<\/li>\n\n\n\n<li>Verify system integrity before restoring to production status<\/li>\n\n\n\n<li>Document all actions taken during recovery<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase 5 \u2014 Post-Incident Review<\/h3>\n\n\n\n<p>Within two weeks of incident closure:<\/p>\n\n\n\n<ol>\n<li>Conduct a lessons-learned meeting with all incident response team members<\/li>\n\n\n\n<li>Document a timeline of the incident from initial compromise to full recovery<\/li>\n\n\n\n<li>Identify security control gaps that enabled the incident<\/li>\n\n\n\n<li>Update this IRP based on findings<\/li>\n\n\n\n<li>Submit required regulatory notifications (if applicable under HIPAA, PCI-DSS, state breach notification laws, etc.)<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 6 \u2014 Case Study: The WannaCry Ransomware Attack of 2017<\/h2>\n\n\n\n<p><strong>Course Context:<\/strong>&nbsp;Cybersecurity Policy and Law&nbsp;<strong>Date:<\/strong>&nbsp;Fall 2023<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>The WannaCry ransomware attack of May 2017 infected more than 200,000 systems across 150 countries within a single day, causing an estimated $4\u20138 billion in damages. It remains one of the most consequential cyberattacks in history and offers critical lessons for security analysts and incident responders. This case study examines the attack&#8217;s technical mechanics, its organizational impact, and the policy implications it raised.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Technical Analysis<\/h3>\n\n\n\n<p>WannaCry exploited EternalBlue, a vulnerability in Microsoft&#8217;s SMB (Server Message Block) protocol. EternalBlue had been developed by the NSA as a cyberweapon and was leaked by a hacking group called Shadow Brokers in April 2017 \u2014 just weeks before WannaCry emerged. Microsoft had released a patch (MS17-010) in March 2017, but millions of systems worldwide had not applied it.<\/p>\n\n\n\n<p>The ransomware spread autonomously through networks without requiring any user interaction \u2014 unlike phishing-based ransomware, WannaCry could self-propagate by scanning for vulnerable SMB ports (port 445) and exploiting them directly. Once a system was infected, files were encrypted and a ransom demand of $300\u2013600 in Bitcoin was displayed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Organizational Impact<\/h3>\n\n\n\n<p>The UK&#8217;s National Health Service (NHS) was among the hardest-hit organizations, with approximately 80 of 236 NHS trusts affected. Operations were disrupted, appointments cancelled, and some hospitals diverted emergency patients. The attack exposed how deeply healthcare organizations had come to rely on legacy systems \u2014 many NHS computers were running Windows XP, which Microsoft had ceased supporting in 2014.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why It Spread So Far<\/h3>\n\n\n\n<p>Several factors enabled WannaCry&#8217;s unprecedented spread:<\/p>\n\n\n\n<ol>\n<li><strong>Unpatched systems:<\/strong>&nbsp;Many organizations had not applied the available MS17-010 patch<\/li>\n\n\n\n<li><strong>Legacy systems:<\/strong>&nbsp;Healthcare, utilities, and government agencies often run outdated systems that cannot be patched without disrupting operations<\/li>\n\n\n\n<li><strong>Flat network architectures:<\/strong>&nbsp;Many organizations lacked internal network segmentation, allowing the worm to spread freely once inside the perimeter<\/li>\n\n\n\n<li><strong>No kill switch awareness:<\/strong>&nbsp;A security researcher accidentally discovered a kill switch domain in the malware&#8217;s code and registered it, slowing the spread \u2014 but many organizations had already been infected<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Lessons for Incident Responders<\/h3>\n\n\n\n<ol>\n<li>Patch management is a non-negotiable security control \u2014 the WannaCry patch was available weeks before the attack<\/li>\n\n\n\n<li>Network segmentation limits the blast radius of self-propagating malware<\/li>\n\n\n\n<li>Legacy systems represent a systemic vulnerability that requires dedicated risk management strategies<\/li>\n\n\n\n<li>Incident response plans must account for scenarios where normal communication channels (email, shared drives) may be compromised<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>WannaCry was not a sophisticated attack. It succeeded because of accumulated organizational failures \u2014 outdated systems, poor patch management, and inadequate segmentation. Its lesson is not primarily technical: it is a lesson about the organizational commitment required to maintain a meaningful security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 4 \u2014 Threat Analysis Report: Phishing Campaign Targeting Corporate Email Course Context:&nbsp;Cyber Threat Intelligence&nbsp;Date:&nbsp;Spring 2024 Executive Summary This report analyzes a spear-phishing campaign identified targeting employees of mid-sized financial services organizations. The campaign used carefully crafted emails impersonating internal IT departments to harvest employee credentials. This analysis covers the attack methodology, indicators of compromise, &hellip; <a href=\"https:\/\/student.wp.odu.edu\/pdamt001\/2026\/05\/03\/skill-2-threat-analysis-incident-response\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SKILL 2: THREAT ANALYSIS &amp; INCIDENT RESPONSE<\/span><\/a><\/p>\n","protected":false},"author":26078,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":2},"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/posts\/16"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/users\/26078"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/posts\/16\/revisions"}],"predecessor-version":[{"id":17,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/posts\/16\/revisions\/17"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/media?parent=16"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/categories?post=16"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pdamt001\/wp-json\/wp\/v2\/tags?post=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}