Nexora Dynamics

This book compiles the "Nexora Dynamics Investigation – Final Report" (Case ND-2025-02-03-001), serving as a comprehensive, simulated case study in incident response (IR) and forensic analysis. This report documents the full lifecycle of a significant security breach at a medium-sized engineering firm, providing a detailed, week-by-week timeline from initial detection to final mitigation strategies.

Nexora Dynamics Investigation – Final Report

Case Details

Case Number: ND-2025-02-03-001   Investigator Name: David Rizzo   Date: March 2, 2025  

1. Executive Summary

Nexora Dynamics, a medium-sized engineering services firm, experienced a significant security breach. The attack began with a successful spear-phishing campaign targeting a contractor, ultimately leading to widespread lateral movement, data exfiltration, and potential disruption of critical systems. An analysis of the timeline, attack vectors, and vulnerabilities has prompted an urgent review of Nexora Dynamics' security posture and the implementation of several key mitigation strategies.

2. Incident Overview

3. Investigation Process

Initial Detection

The network anomaly at Nexora Dynamics was first detected by Lisa Reynolds, the Network Administrator. Lisa observed major slowdowns across multiple systems and received reports from both users and monitoring tools [1]. She noted that the web server and the database server were getting hit the hardest. Upon checking traffic logs, Lisa identified a high volume of suspicious incoming connections from the following IP ranges:

Lisa also noted that the load balancer was struggling and that a couple of servers had crashed and rebooted earlier that day.

Tools Used for Investigation

Interviews

Sarah (Employee)

John Carter (Junior Network Engineer)

Jordan Steele (Chief Information Officer)

4. Technical Findings

Symptoms Observed

Affected Equipment

Cyber Actors

Attack Vectors

5. Root Cause Analysis (vulnerabilities)

6. Recommendations (mitigations)

7. Conclusion

Nexora Dynamics faced a sophisticated and persistent cyberattack that exploited multiple vulnerabilities in its security infrastructure. The quick identification of these vulnerabilities and the subsequent development of comprehensive mitigation strategies are crucial steps toward improving the company's overall security posture and preventing future incidents.

Notes

Notes

CIO Company Address

CIO Update

Network Issues

- Slowdowns
- Webpages taking forever to load
- Difficulty accessing services or complete downtime
- servers randomly crashing & rebooting without any clear Explanation
- Spike in network traffic & bandwitdth
- Infastructure strain
- Revenue loss
- Potential client distrust & client loss

Notes

- Possible Denial of Service Attack
    - Competitor to steal business?
    - Nation State Actor?
        - Clients are private sector, government, and infastructure, trasnportation, and energy. 
        - Possibly they want to disrupt critical services and criple economy.
Notes

Introduction to Advanced Persistent Threats

Email from John Carter to Fellow IT Team

Potential Cyber Threat Actors responsible for the attack impacting Nexora Dynamics

APT - Sophisticated Cyebr Attackers that operate golablly each with their own targets tools and motivations

Four Groups: APT 33 - Elfin Originating from Iran Focuses on Sectors like Energy, aerospace, petrochemcials, and manufacturing Main motivation is Espionage and disruption of critical infastructure, particular interest in middle east and the western world Attack Vectors: Spear Phishing (Highly Targeted Emails that exploit vulnerabiliteis in attachements or links putting malware directly on the victims systems.) Powershell based malware to enable persistent backdoors into victims systems. Credential Harvesting and Lateral Movement Once inside use tools to steal credentials and move laterally. Known to deploy destructive wiper malware APT 28 - Fancy Bear Russia Based Group Targeting government entities, political organizations, media outlets, and defense contractors Attack Vectors: Spear Phishing Credential Theft Use social engineering to steal credentials to high profile accounts Toolkit of sophisticated malware Espionage, Remote Access, C2 Infastructure Politically Motivated
APT 34 - OilRig Iran Linked group Targets financial Sector, telecommunications, government agencies, and energy firms Emphasis on middle eastern companies, and their allies. Attack Vectors: Phishing Use social engineering tactics to compromise networks Credential Harvesting Gather user credentails WEb based Exploits and VPN attacks Exploit vulnerabilites in web applications and vpns to gain access to internal systems. Allows them to remain hidden while they gather intelligence Custom Backdoors and Scanning Tools Used to maintain access Also known for their lateral movement capabilities Find high value targets Espionage, Survillence, long term footholds in network APT 29 - Cozy Bear Russian Linked Group Known for is stealthy focus on government agencies, dimplocatic institutions, and think tanks High rofile espionage campaigns aimed at gathering intelligence from werstern targets Attack Vecotrs: Sohpicsticated Speat Phishing Deploy Advanced Malware, through attachments or cloud services, Supply Chain Attacks Infiltrate Third party vendors to reach tehir targets Custom malware and advanced persistence Invade detection and maintain longterm access Living Off the Land Techniques CLoud servies and legitimate software to blend in with network traffic Difficult to detect thier activiteis

Notes

Equipment

Key Infastructure Imacated, Integral to both inertnal operationbs and external system delivery

Web Server puiblic facing application Substancial delays in response times and service availablitlity to to abnormla traffic volumes Increase page load times and intermittented unavailabliltiy Database Server | proccessing and storing critical business data Resource exhaustion CPU and Memory usuage spiked significantly during the period of disruption leading to crashes and data restrieval issues Load Balancer unable to handle the suddent increase in incoming requests system strugled to maintain an even distribution causing some servers to become overwhelmeed while other remained under utalized Firewall Has been under heacvy strain due to to the high volume of incoming connection attempts Many were flagged as suspicious proccesing and inspection processes caused bottlenecks further contributing to system slowdowns Router handling a significant amount of unexpected traffic resulted in packet loss and increased latency distrupted data flow and contributed to network instability switch experienced congestion due to excessive traffic between devices Delays in internal communications and degraded performance or critical internal applications Contend Delivery Network (CDN) Responsible for distributing content to users has experienced significant delays in delivering services to clients Unuasally high traffic volumes have overburdened the CDNs capactity causing delys and occasianl time outs in content delivery DNS Server Heaveliy targeted leading to disruptions in resolving domain names to ip addresses Caused widespread connectivity issues in both internal and extneral users Email Server Significant backlog of emails and delays in delivery due to netwokr congestions impacted internal communication and delayed responses to external queryies VPN Gateway Responsible for managing secure remote connections has been intermittenlty inaccessible Influx of connection attempts overloaded the gateway affecting access for employees and partners

Notes

Interviews

Sarah

About

- Employee
- Describes challanges she has recently faces with Nexora network and web server.

Notes

- Network Slow
- Affects productivity
- Tasks such as sending and email or accessing files take longer than they should
- Webserver was working one day and then stopped the next
    - No one could access it
- Lots of disruption
- Access to workday & benefits are inconsistent and sometimes does not load

John Carter

About

- Employee | Junior Network Engineer
- Update on his oversvations regarding the network issues
- Started 1 Week ago

Notes

- Noticable slowdown on network
- webpages taking much longer to load than usual
- Users reported difficulty accessing services
    - Few cases sevice unavailable errors
- Sudden spike of traffic from a range of IP Addresses that do not typically interact with the network
- Bandwidth usage unusally high
    - No increase in legitimate user activity
-Possiblity of more down time & performace issues
Oberservations
- Increase Network Traffic
- Slow and unresponsive web traffic and devices
- Productivity lowered
    - Denial of service by increasing network traffic to a point of inusability

Docs

Docs

Threat Actor Email

From: John Carter (IT Supervisor)
To: Sarah Barnes (System Administrator), Lisa Reynolds (Network Administrator)
CC: IT Security Team

Hi Sarah, Lisa,

Thank you both for all the hard work in getting to the bottom of this incident. Given the indicators we’ve found—spear-phishing emails, PowerShell-based backdoors, and the subsequent lateral movement—it’s becoming crucial to determine which threat actors are capable of deploying such a sophisticated attack on Nexora Dynamics.

Based on what we know, I’d like to hear your thoughts on which APT groups could be responsible for this breach. Specifically, we should consider threat actors who have the means, motivation, and methods aligned with what we’re seeing.

Some potential groups that come to mind include:

Given that we haven’t seen an outright ransomware attack or clear financial motivation, it’s likely we’re dealing with either a nation-state actor or an APT with a strategic interest in our sector. Let me know your thoughts on these possibilities or if you believe another threat actor could be involved.

Understanding the likely threat actor is critical in determining how to respond effectively and prevent further attacks. Any additional insights on their TTPs or motivations would be invaluable as we put together a defense and recovery strategy.

Thanks,
John

From: Sarah Barnes (System Administrator)
To: John Carter (IT Supervisor), Lisa Reynolds (Network Administrator)
CC: IT Security Team

Hi John, Lisa,

Based on what we’ve seen so far, I’d agree that APT 33 is a strong candidate given their known focus on sectors similar to ours and their use of PowerShell-based backdoors. Their track record of using spear-phishing to gain initial access and then deploying malware to spread within the network aligns closely with what we're experiencing.

That said, I wouldn’t rule out APT 34 (OilRig) either. They have been quite active and have a known preference for targeting the same industries. Their techniques often involve credential harvesting and lateral movement using legitimate admin tools, similar to what we’re observing here.

While APT 28 (Fancy Bear) and APT 29 (Cozy Bear) are always worth considering given their sophisticated capabilities, their recent activity seems to focus on government and diplomatic entities, which makes them slightly less likely than the others mentioned. However, it’s possible that they could have motives aligning with our industry, especially if they are pursuing intelligence-gathering objectives.

If I were to prioritize, I’d say APT 33 and APT 34 are the most likely suspects based on their TTPs and the nature of our organization. I’ll start gathering more intel on their recent activity to see if anything matches up directly with what we’ve been seeing.

Let me know if there’s anything specific you'd like me to focus on.

Best,
Sarah

From: Lisa Reynolds (Network Administrator)
To: John Carter (IT Supervisor), Sarah Barnes (System Administrator)
CC: IT Security Team

Hi John, Sarah,

I agree with both of you on APT 33 being a likely candidate. The tactics of using spear-phishing to gain entry, followed by fileless malware like a PowerShell backdoor, are in line with what we know of their playbook. Their interest in critical infrastructure and energy-related sectors also makes sense given our organization's profile.

I’d add that APT 34 (OilRig)’s known use of custom backdoors and VPN exploits could fit our incident as well. Their history of targeting supply chains and service providers in industries like ours makes them a good fit for further investigation. They’re known for deploying a mix of custom and commodity malware, which could explain the combination of tools we’ve found so far.

I’ll dig deeper into any network signatures or known IoCs specific to APT 33 and APT 34 to see if we can make a more definitive match. We might also want to consider any geopolitical tensions or motives that would make our organization a higher priority for these actors.

I’ll keep gathering more details and share anything relevant as it comes up.

Thanks,
Lisa

Docs

Equipment Email

All,

Just wanted to report on the list of IT equipment impacted by the recent network issues, including make, model, and serial numbers for each. Please review the details below and let me know if any additional information is required for troubleshooting.

  1. Web Server
    • Make: Dell PowerEdge R740
    • Model: PER740XA2
    • Serial Number: DCH45T9P8Q0
  2. Database Server
    • Make: HPE ProLiant DL380 Gen10
    • Model: DL380-G10-XL
    • Serial Number: USE689PR4C1
  3. Load Balancer
    • Make: F5 Networks BIG-IP 2000 Series
    • Model: BIG-IP i2600
    • Serial Number: F512AX97R3
  4. Firewall
    • Make: Cisco Firepower 2100 Series
    • Model: FPR-2110
    • Serial Number: CFP212345C
  5. Router
    • Make: Cisco ASR 1000 Series Aggregation Services Router
    • Model: ASR1001-HX
    • Serial Number: CASR10X689A
  6. Switch
    • Make: Cisco Catalyst 9300 Series
    • Model: C9300-24P-E
    • Serial Number: CAT9356YPQ2
  7. Content Delivery Network (CDN)
    • Make: Akamai Adaptive Media Delivery (Cloud-based)
    • Model: N/A (Cloud Service)
  8. DNS Server
    • Make: Infoblox DDI Appliance
    • Model: Trinzic 1410
    • Serial Number: TZN76423X98
  9. Email Server
    • Make: Microsoft Exchange Server 2019 (Running on VMware)
    • Model: N/A (Virtualized)
  10. VPN Gateway
    • Make: Palo Alto Networks GlobalProtect
    • Model: PA-5220
    • Serial Number: PANGP52321K

Let me know if you need any further details for logging or inventory purposes.

Best regards,
John Carter
IT Engineer, Nexora Dynamics

Docs

Attack Symptoms

Email 1: From Lisa Reynolds (Network Administrator) to John Carter

Subject: Urgent: Network Slowdown and Unusual Traffic

Hi John,

We’re seeing major slowdowns across multiple systems. I’ve received reports from both users and monitoring tools. It looks like the web server and the database server are getting hit the hardest right now. I checked the traffic logs, and there are a lot of suspicious incoming connections from the following IP ranges:

It looks like the load balancer is struggling too, and a couple of servers crashed earlier today and rebooted. Can you take a look at the firewall and router traffic on your end? This might be more than a typical traffic spike.

Thanks,
Lisa Reynolds
Network Administrator

Email 2: From John Carter (Mid-Level IT Engineer) to Lisa Reynolds, Alex Torres (Security Analyst), and Sarah Barnes (System Administrator)

Subject: RE: Urgent: Network Slowdown and Unusual Traffic

Hi Team,

Thanks for the heads-up, Lisa. I just pulled some data from the firewall and router logs. The firewall is getting hammered with requests from the IP addresses you mentioned, and I’m seeing a bunch of others as well:

These IPs are making thousands of connection attempts every minute. Our bandwidth is completely maxed out, and I think it’s spilling over to affect the VPN gateway too—remote users are reporting connection drops. We may need to start blocking some of these IPs at the firewall level immediately.

Alex, can you cross-reference these IPs with any known malicious actors? Sarah, can you check on the DNS and email servers? There are likely other systems being affected that we haven't caught yet.

Let’s regroup after you’ve had a chance to review the data.

Best,
John Carter
Mid-Level IT Engineer

Email 3: From Alex Torres (Security Analyst) to John Carter, Lisa Reynolds, and Sarah Barnes

Subject: RE: Urgent: Network Slowdown and Unusual Traffic

Hey team,

I just checked the IPs that John and Lisa listed, and several of them are flagged in our threat intelligence database as being part of known botnet activity. Here’s the breakdown:

This is definitely coordinated, and it looks like they’re targeting multiple layers of our infrastructure. I recommend we move forward with blocking these IPs and maybe even implement rate-limiting on the load balancer. Let me know if I should proceed.

Alex Torres
Security Analyst

Email 4: From Sarah Barnes (System Administrator) to John Carter, Lisa Reynolds, and Alex Torres

Subject: RE: Urgent: Network Slowdown and Unusual Traffic

Hi All,

I’ve checked the DNS and email servers, and both are showing significant strain. The DNS server has been getting bombarded with requests for random subdomains, which is likely contributing to the slowdowns. The email server is also showing unusual traffic, and there are some delays in delivery.

I’m working on clearing the queue for the email server, but we might need to offload some of this traffic before it gets worse. Should we also look into adjusting DNS settings to filter out some of the bad traffic? Let me know if there’s anything else I can assist with.

Sarah Barnes
System Administrator

Email 5: From John Carter to Lisa Reynolds, Alex Torres, and Sarah Barnes

Subject: RE: Urgent: Network Slowdown and Unusual Traffic

Thanks for the quick responses, everyone. Let’s go ahead and start with blocking those malicious IP addresses on the firewall, and Alex, go ahead with the rate-limiting setup on the load balancer. Sarah, adjusting the DNS settings to filter out the bogus requests sounds like a good move. Once we’ve got these measures in place, we should monitor for further spikes and reconvene if the situation escalates.

I’ll update management with our progress. Let’s stay on this and continue collaborating. Thanks again for jumping on it so quickly.

Best,
John Carter
Mid-Level IT Engineer

Docs

Company Info

Company Name: Nexora Dynamics

Industry: Engineering Services

Company Size: Medium-sized enterprise (250-500 employees)

Headquarters: Baltimore, MD

Established: 2008

Company Overview:

Nexora Dynamics is a leading provider of cutting-edge engineering services, specializing in advanced technology solutions for industries such as aerospace, defense, energy, and infrastructure. With a focus on innovation, Nexora Dynamics offers a range of services, including systems design, testing, and operational support, tailored to meet the needs of both private sector clients and government agencies.

As a medium-sized firm, Nexora Dynamics maintains agility and a customer-first approach while delivering robust solutions that rival those of much larger competitors. The company’s mission is to empower clients with high-quality engineering solutions that drive efficiency, sustainability, and technological advancement.

Core Services:

  1. Systems Engineering:
    • Design and implementation of complex systems across various industries, ensuring integration, performance, and reliability.
  2. Product Development & Testing:
    • Full product lifecycle support, from initial concept to prototyping, testing, and production readiness.
  3. SCADA Systems & Automation:
    • Expertise in SCADA (Supervisory Control and Data Acquisition) systems, with a focus on automation and control systems for critical infrastructure.
  4. Cybersecurity & Risk Management:
    • Comprehensive OT (Operational Technology) security assessments, vulnerability testing, and implementation of robust security measures for critical systems.
  5. Consulting & Technical Support:
    • Advisory and on-site technical support services for optimizing operations, improving safety standards, and reducing downtime.

Key Clients:

Company Vision:

To be the trusted partner for organizations seeking innovative engineering solutions that solve complex challenges and propel them into the future. Nexora Dynamics is committed to fostering a collaborative environment that drives forward-thinking solutions and enables clients to thrive in an increasingly technological world.

Values:

Leadership Team:

Office Location:

Nexora Dynamics
3200 Innovation Parkway
Suite 500
Baltimore, MD 21201
United States