Chapter 2: The In accessibility version
The Anatomy of a Hack, Chapter 2: The In, Page 1
Some time later, the scene returns to the dark office building at the Threat Actor Organization office. Sabrina is seen tracking the malware on her computer, which has been delivered. What’s left is for the malware is deployment and activation.
Sabrina receives a message from Anon on the team group chat, asking if the team’s malware package has been detected. Sabrina responds to the message: Either Cindy hasn’t reported our phishing email to IT, or our payload was hidden so well that it hasn’t been found.
Anon receives Sabrina’s message and smiles mischievously. He types a response: Great. Now we’ll focus on exploiting the system’s vulnerabilities to get our additional malware packages into the system.
The Anatomy of a Hack, Chapter 2: The In, Page 2
The team chat continues. Anon directs each member on what to do next. Connor creates authorized employee credentials and uses the emails to send requests for VPN and multi-factor authentication access credentials on the Health Care Agency service request portal. He also submits requests on the Health Care Agency service request portal for a work laptop and phone, email address, and additional permissions.
Sabrina continues to build malware packages disguised to look like PowerPoint and Word documents on the targeted network.
Derrick uses the authorized credentials from Connor to replace good files on the Health Care Agency network with Sabrina’s malware packages.
Anon smiles smugly as he plans to install and activate the ransomware packages once they have enough control of the network.
The Anatomy of a Hack, Chapter 2: The In, Page 3
Connor responds to Anon’s message with a worried look on his face: This looks like a good plan, Anon. But how do we know we won’t get caught? Based on my research, it seems like this organization has strong security measures in place. If we get found out, it will all be over.
The scene changes to the Health Care Agency IT & Security Unit where employees are at work. A staff member runs an anti-malware scanner on the Health Care Agency network.
Malware is seen on the Health Care Agency server. However, as the IT employee activates the anti-malware scanner, there is no malware detected. Once the anti-malware scan is complete, the malware reappears from hiding on the server.
The scene changes to Anon on his computer. He replies to Connor’s message: Because Cindy didn’t report anything, our footprints can stay undetected, in the shadows. He looks at his computer with a satisfied grin as he sends his message: And besides, while they have to be right 100% of the time, we only have to get it right once.
The Anatomy of a Hack, Chapter 2: The In, Page 4
Meanwhile, Cindy is working at her workstation. She is in a rush to finish her report by the end of the day. A notice on her computer appears, showing that the company network is down. Cindy contemplates calling the IT Service Desk about her problem, but after checking the time she decides to restart her computer instead.
Cindy’s face is relieved when this works. She notices a new file on the Health Care Agency shared folder titled “Deck”. Before thinking about this further, Cindy realizes she is going to miss her deadline and gets back to work. A few moments later, Cindy finishes her report with a smile on her face. She walks away from her desk.
Looming on her computer screen is the unknown “Deck.ppt” file, one of Sabrina’s disguised malware packages.
The names and events used, past or present, in this story are fictional. Any resemblance to entities, people, or events is purely coincidental.