Overview
What began as a routine day at Ghost HQ quickly escalated into a race against time to thwart a major cyber attack on one of our clients. As part of our proactive monitoring service, our tech team conducts daily cyber checks for our clients. During one of these checks, our 2nd Line Technical Engineer, Josh, noticed something unusual about some spam entries on their website. Upon closer inspection, Josh realised these entries exhibited specific characteristics of a hacker. The data submitted by the hacker as the “Company” was crafted to exploit vulnerabilities and attempt to break through to the backend server. If successful, this would have allowed the attacker to directly communicate with the server and request sensitive information. For instance, on a website holding credit card information, an attacker could have stolen this data or obtained admin login details for the database.
Objective
Josh quickly worked to understand the full scope of the attack, identifying all vulnerable form submissions and installed heightened cybersecurity features to prevent these from getting through again. The spam mailbox continues to be monitored for signs of suspicious activity.
Summary
For our client, such an attack would have been catastrophic. Most people would have dismissed these submitted forms as mere spam and not acted on them. However, on this day, Josh went above and beyond, leveraging his cybersecurity skills to prevent a major attack.
To learn more about our cybersecurity services, please book a discovery call with a member of our team today.