Arc4dia is cyber defense company which helps clients to find weak spots in their companies security systems.I was asked to illustrate specific case studies to show visually how those weak spots are found. Those illustrations are targeted for companies IT specialists - they are kind of technical and advanced. My experience in software engineering and programming made my work of communicating with client understanding and explaining those specifics much easier.
Half a World Away
A wireless router providing remote VPN access was identified and Arc4dia was able to provide Experts for the client helping against the employee in question.
Message in the Bottle
The binaries referred to loading the legitimate API DLL found on the system used to generate and transfer the usage data and looked to be legitimate like from the product itself. The key strokes were likely going to be collected to redirect the data stream to an enemy controlled server.
Snow mobile system
Comparison between regular and protected mobile
Whatever Conflicts May Come
The analyst begins feeding characteristics into Arc4dia’s systems and is able to identify two completely different pieces of malware present on other systems that have a least one characteristic in common with three different versions identified. A list of network characteristics is provided to the client so that the existing security team can attempt to correlate the malicious activity across all of their assets.
1 ) During the baselining phase at a new client, Arc4dia analysts observed odd behavior from what looked like an Acrobat Reader component named extremely closely to other various components in the directory. But when observed being launched sometimes contained IP addresses or Domains.
2 ) During the baselining phase at a new client, Arc4dia analysts observed odd behaviour from what looked like an Acrobat Reader component named extremely closely to other various components in the directory. But when observed being launched sometimes contained IP addresses or Domains.
3 ) A handful of interactive sessions were detected over time, eventually providing enough data to do an analysis mapping the activity onto a time zone, days of the week and holidays of a specific country.