SlideShare a Scribd company logo
POST-MORTEMOF
ADATABREACH
Janne Kauhanen @jkauhanen
Jani Kallio @janikallionet
F-Secure Cyber Security Services
2
100+ASSIGNMENTS/
3YEARS
SERVICEPROVIDER”CORPX”
 Listed on several international
stock exchanges
 Provides application services,
e.g. to financial sector
 Never thought they could be
targeted – ”we’re just a regular
company”
3
SITUATIONONEMORNINGINSEPT2015
 ”7GB of data was sent from one
financial department employees PC
to IP-address xxx.xxx.xxx.xxx.”
 F-Secure Labs confirmed the address
as a known data exfiltration server,
used in a recently activated campaign
4
5
Watering
hole
Command
& Control
Data
Exfiltration
RECON
6
Watering
hole
Command
& Control
Data
Exfiltration
EXPLOITATION
7
Watering
hole
Command
& Control
Data
Exfiltration
ATTACKKIT
DELIVERY
8
Watering
hole
Command
& Control
Data
Exfiltration
LATERAL
MOVEMENT
9
Watering
hole
Command
& Control
Data
Exfiltration
DATA
COLLECTION
10
Watering
hole
Command
& Control
Data
Exfiltration
DATA
EXFILTRATION
WHATWASTHEBUSINESSIMPACT
ON”CORPX”?
11
Jani Kallio
F-Secure Cyber Security Services
Professional Services, Management Consulting
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Discovery
Long-term implications
- Loss of revenue
- Stock price effect
- Brand & Reputation damage
- Regulatory fines
- Contractual fines
- Costs incurred in remediation
- 3rd party legal liability
Incident Response
- IT Forensics
- Legal & Regulatory review
External areas
- Public Relations
- Notification management
- Stakeholder Communication
- Remedial Service Provision
Time
Short-term implications
- Loss of efficiency & delivery
- Internal reporting mayhem
- Management’s focus on incident,
not on business
- Costs incurred in response
- Customer interface overload
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
IT anomaly
Stakeholderfocus&attention
Resourcedemand
Time
IT
anomaly
Discovery, IRT-
team involved
Escalation to
MIM
Stakeholder
notification
according the
process
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
Client’s FSA’s
information
request
Legal (external), and
internal Sec
resources tied to
find answers
A client demands
explanation;
Who, why, how,
scope, remediation?
-> KAMs try to
manage
National Data Privacy
Ombundsman requests
information
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
COMMS department
demands info to
prepare statements in
advance
External PR
company
involved
1st forensics report:
The breach larger than
expected
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
CEO: prepare a
statement to BoD
Escalation to the
Management Team
IRT+MIM+CMT
organization in
place
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
Closed
accounts
hinder internal
operations
Client’s tender
process freezed
CMT decision:
To isolate a
suspected
system.
Reporting to
client’s FSA
Several units
require
instructions
from CMT
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
Stakeholderfocus&attention
Resourcedemand
Time
Improvement
program
scoping Today
Risk
assessments
Major Security
Improvement
program
initiated
SIMPLIFIEDCYBERBREACH’SBUSINESSIMPACT TIMELINE
 Succesfull business makes you a potential target
 This case was a textbook example
 Although prepared, the level of business disruption
came as a surprise
 You have firedrills – why not cyberdrills ?
© F-Secure Confidential
SUMMARY
SWITCH ON
FREEDOM
© F-Secure Confidential

More Related Content

PDF
Anatomy Of A Breach: The Good, The Bad & The Ugly
PDF
BEA Presentation
PDF
Cybersecurity: How to be Proactive
PDF
Stopping zero day threats
PDF
cyber attacks In-depth Report on five organizations affected by cyber attacks
PDF
cyber attacks analysis top five organization affected by cyber attacks
PDF
Threats, Threat Modeling and Analysis
PPTX
SoCal HIMSS Privacy Security Webinar
Anatomy Of A Breach: The Good, The Bad & The Ugly
BEA Presentation
Cybersecurity: How to be Proactive
Stopping zero day threats
cyber attacks In-depth Report on five organizations affected by cyber attacks
cyber attacks analysis top five organization affected by cyber attacks
Threats, Threat Modeling and Analysis
SoCal HIMSS Privacy Security Webinar

Similar to Post-mortem of a data breach (20)

DOCX
Document-3.docx
PDF
CNIT 152: 1 Real-World Incidents
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
PPTX
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
PDF
f6_cyber_security_and_your_agency.pdf
PDF
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
PDF
Data Breach Response: Before and After the Breach
PDF
Douglas Jambor Sageworks Cybersecurity Presentation
PDF
Investigating Cooridinated Data Exfiltration
PPTX
Retail Security: Closing the Threat Gap
PPT
Cyber-Security: A Shared Responsibility -- November 2013
PPT
Current Emerging Threats
PPSX
November 2017: Part 6
PPTX
Too Small to Get Hacked? Think Again (Webinar)
PDF
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
PPT
All's Fair in Love and Cyber Warfare
PDF
Data Breach Detection: Are you ready for GDPR?
PPTX
Implications and response to large security breaches
Document-3.docx
CNIT 152: 1 Real-World Incidents
2022 Rea & Associates' Cybersecurity Conference
 
CyberCare Pro - Cybersecurity for SME's updated.pptx
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
f6_cyber_security_and_your_agency.pdf
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Data Breach Response: Before and After the Breach
Douglas Jambor Sageworks Cybersecurity Presentation
Investigating Cooridinated Data Exfiltration
Retail Security: Closing the Threat Gap
Cyber-Security: A Shared Responsibility -- November 2013
Current Emerging Threats
November 2017: Part 6
Too Small to Get Hacked? Think Again (Webinar)
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
All's Fair in Love and Cyber Warfare
Data Breach Detection: Are you ready for GDPR?
Implications and response to large security breaches
Ad

More from F-Secure Corporation (20)

PDF
How do you predict the threat landscape?
PDF
Got hacked? It’s too late to run now!
PDF
The Real Costs of SIEM vs. Managed Security Service
PDF
Security A to Z: Glossary of the most important terms
PDF
Les attaques menées depuis la France dans le cyber espace
PDF
Les attaques menées depuis la France dans le cyber espace
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PDF
Defending Servers - Cyber security webinar part 3
PDF
Defending Workstations - Cyber security webinar part 2
PDF
Cyber security webinar part 1 - Threat Landscape
PPTX
F secure Radar vulnerability scanning and management
PDF
F-Secure Policy Manager - onsite security management with superior control
PDF
The State of the Net in India
PDF
Best business protection for windows
PDF
Six things to take into account when choosing cloud solutions
PDF
Small and midsize business security is big business
PDF
大きなビジネスを生み出す中小中堅企業
PDF
Why should you care about government surveillance?
PDF
Arbeta var du vill- eBook om modern mobilitet
PDF
Psb mobile security
How do you predict the threat landscape?
Got hacked? It’s too late to run now!
The Real Costs of SIEM vs. Managed Security Service
Security A to Z: Glossary of the most important terms
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
Cyber security webinar 6 - How to build systems that resist attacks?
Defending Servers - Cyber security webinar part 3
Defending Workstations - Cyber security webinar part 2
Cyber security webinar part 1 - Threat Landscape
F secure Radar vulnerability scanning and management
F-Secure Policy Manager - onsite security management with superior control
The State of the Net in India
Best business protection for windows
Six things to take into account when choosing cloud solutions
Small and midsize business security is big business
大きなビジネスを生み出す中小中堅企業
Why should you care about government surveillance?
Arbeta var du vill- eBook om modern mobilitet
Psb mobile security
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Download FL Studio Crack Latest version 2025 ?
PPTX
history of c programming in notes for students .pptx
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
Cost to Outsource Software Development in 2025
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Download FL Studio Crack Latest version 2025 ?
history of c programming in notes for students .pptx
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Reimagine Home Health with the Power of Agentic AI​
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Operating system designcfffgfgggggggvggggggggg
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Wondershare Filmora 15 Crack With Activation Key [2025
AutoCAD Professional Crack 2025 With License Key
Cost to Outsource Software Development in 2025
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Design an Analysis of Algorithms I-SECS-1021-03
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
WiFi Honeypot Detecscfddssdffsedfseztor.pptx

Post-mortem of a data breach