SIMULATION
-
A company recently experienced a security incident. The security team has determined a user clicked on a link embedded in a phishing email that was sent to the entire company. The link resulted in a malware download, which was subsequently installed and run.
INSTRUCTIONS
-
Part 1
-
Review the artifacts associated with the security Incident. Identify the name of the malware, the malicious IP address, and the date and time when the malware executable entered the organization.
Part 2
-
Review the kill chain items and select an appropriate control for each that would improve the security posture of the organization and would have helped to prevent this incident from occurring. Each control may only be used once, and not all controls will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Alarming_Subject
Highly Voted 9 months agocf83993
Highly Voted 8 months, 1 week agolongnh87
Most Recent 2 months, 1 week agoJomoca
2 months, 2 weeks agocy_analyst
8 months, 2 weeks agothisguyfucks
8 months, 2 weeks agocy_analyst
8 months, 1 week ago78f9a0a
6 months, 1 week agoIE17
7 months, 3 weeks agoID77
8 months, 1 week agobinogamer12
9 months, 3 weeks agoalialzehhawi
9 months agopendekarsuling
8 months, 2 weeks agoFreshly
7 months, 2 weeks agojdlrosa
6 months, 3 weeks agovoiddraco
10 months, 2 weeks ago