CASE 1:
ENGINEERING FIRM NOTPETYA ATTACK 2016
CHALLENGE
Developed as a disk-wiping cyber weapon by the Russian military and helped along by a leaked version of the NSA’s EternalBlue hacking tool – which is the same exploit that powered the WannaCry ransomware outbreak, NotPetya’s target was businesses in Ukraine.
However, the attack soon spread out of control and affected millions of businesses worldwide. It quickly became renowned as one of the most destructive and prolific cyber attacks of the 21st century
SOLUTION
Once the attack was contained, ACDS developed a data-recovery strategy while maintaining basic operations of the large firm in order continue functioning. The attack had severely compromised the client’s databases and digital assets, to the point that financial processes were halted due to the destruction of payment and supplier information.
During this time ACDS’ services offset a potential union strike and significant revenue losses by reconfiguring financial systems in order to keep the business afloat while the effects of the attack were mitigated.
RESULT
The technology, procedures and preventative mechanisms developed by ACDS were adopted by the parent organisation in the EU (which also suffered massive losses due to the attack) as a best practice solution to address events like these in future.
WHY IS THIS IMPORTANT?
ACDS worked day and night to resolve the attack while helping the client to function in order to prevent the company from potentially closing its doors
ACDS was lauded for the speed, ingenuity and complete dedication to help their client recover from one of the worst cyber attacks of all time.
DAMAGE CONTAINED
FACT
CASE 2:
WANNACRY WORM ATTACK ON BLUE CHIP ENTERPRISE – 2017
CHALLENGE
SOLUTION
The problem was initially addressed by deploying a vulnerability analysis to inspect all online machines for the MS17-010 vulnerability, and isolate those machines.
Subsequent global intelligence enabled ACDS to isolate the attack by cutting off the data centre from the business in order to implement recovery and retrieval protocols.
RESULT
WHY IS THIS IMPORTANT?
Unique code and Intercept played a key role in identifying and neutralising the attack
ACDS’ connections and international network enabled a swift solution facilitated by information-sharing and global learning
DAMAGE CONTAINED
FACT
CASE 3:
GLOBAL EMAIL SECURITY PLATFORM – 2018
CHALLENGE
While conducting stringent checks, ACDS discovered that the email filters, which were being tested, did not flag any new domains. These either looked very similar to an existing domain (such as google.com), or did not flag them for the pure fact that they were considered new domains – which are often used in large-scale cyber attacks.
ACDS successfully used this vulnerability to send a crafted phishing email to an IT director within the client’s organisation. The director did not identify the email as a phishing attack, clicked on the link, which redirected them to a benign site that mimicked the client’s intranet. The site then prompted the client to enter a username and password and therefore posted the credentials to ACDS – completely bypassing the inefficient targeted threat protection in the email security system.
This vulnerability posed a significant security risk for both the email marketing company and the software they supply to others.
SOLUTION
RESULT
WHY IS THIS IMPORTANT?
ACDS is a global contributor of cyber security best practices to global firms
ACDS identified a vulnerability that could have cost the company and its users billions in revenue and other damages
DAMAGE CONTAINED
FACT
WE ARE HERE TO HELP.
Is every device, user account across your network secure right now?
Contact ACDS for always-on cyber defenses that go further and faster.
South Africa Office
AMR Building 3, Concorde Rd E, Bedfordview, 2008
Call
087 073 9370