# Nexora Dynamics

This book compiles the "Nexora Dynamics Investigation – Final Report" (Case ND-2025-02-03-001), serving as a comprehensive, simulated case study in incident response (IR) and forensic analysis. This report documents the full lifecycle of a significant security breach at a medium-sized engineering firm, providing a detailed, week-by-week timeline from initial detection to final mitigation strategies.

# Nexora Dynamics Investigation – Final Report

## Case Details
**Case Number:** ND-2025-02-03-001  
**Investigator Name:** David Rizzo  
**Date:** March 2, 2025  

## 1. Executive Summary

Nexora Dynamics, a medium-sized engineering services firm, experienced a significant security breach. The attack began with a successful spear-phishing campaign targeting a contractor, ultimately leading to widespread lateral movement, data exfiltration, and potential disruption of critical systems. An analysis of the timeline, attack vectors, and vulnerabilities has prompted an urgent review of Nexora Dynamics' security posture and the implementation of several key mitigation strategies.

## 2. Incident Overview

- **Incident Date:** Week 4
- **Reported By:** Network Administrator
- **Location:** Service Slowdown
- **Affected Systems:**
  - Web Server: Dell PowerEdge R740
  - Load Balancer: F5 Networks BIG-IP 2000 Series
  - Content Delivery Network (CDN): Akamai Adaptive Media Delivery (Cloud-based)
  - DNS Server: Infoblox DDI Appliance
  - Email Server: Microsoft Exchange Server 2019 (Running on VMware)
  - VPN Gateway: Palo Alto Networks Global Protect

## 3. Investigation Process

### Initial Detection
The network anomaly at Nexora Dynamics was first detected by Lisa Reynolds, the Network Administrator. Lisa observed major slowdowns across multiple systems and received reports from both users and monitoring tools [1]. She noted that the web server and the database server were getting hit the hardest. Upon checking traffic logs, Lisa identified a high volume of suspicious incoming connections from the following IP ranges:
- 192.168.45.0/24
- 203.123.155.200
- 45.76.19.132

Lisa also noted that the load balancer was struggling and that a couple of servers had crashed and rebooted earlier that day.

### Tools Used for Investigation
- **Firewall and Router Logs:** John Carter pulled data from these logs to identify the volume of requests and suspicious IP addresses.
- **Threat Intelligence Database:** Alex Torres cross-referenced IP addresses with a threat intelligence database to identify known malicious actors.
- **Network Monitoring Tools:** Lisa Reynolds initially detected the slowdowns using network monitoring tools.
- **Endpoint Detection and Response (EDR) Solution:** Alex Torres reviewed endpoint protection logs to investigate the tools used by the attackers. An upgrade to a better EDR solution was recommended.

### Interviews

#### Sarah (Employee)
- The network is experiencing slowness, impacting productivity and causing disruptions to various tasks and services.
- Specifically, sending emails and accessing files are taking longer than usual, and the web server has become inaccessible.
- These issues are causing significant disruption to daily operations, including inconsistent access to essential services like Workday and benefits platforms.

#### John Carter (Junior Network Engineer)
- Started a week ago
- The network is experiencing a noticeable slowdown, with webpages taking longer to load than usual.
- Users reporting difficulty accessing services, including occasional "service unavailable" errors.
- This slowdown coincides with a sudden spike in traffic from IP addresses that don't normally interact with the network.
- Unusually high bandwidth usage despite no increase in legitimate user activity.
- This suspicious activity suggests the possibility of further downtime and performance issues.

#### Jordan Steele (Chief Information Officer)
- The network is suffering from slowdowns, causing webpages to load slowly and hindering access to services, sometimes resulting in complete downtime.
- Servers are randomly crashing and rebooting without a clear cause.
- Spike in network traffic and bandwidth usage, straining the infrastructure.
- These issues are leading to revenue loss and the potential for client distrust and loss.

## 4. Technical Findings

### Symptoms Observed
- **Network Slowdowns:** Major slowdowns were observed across multiple systems. The web server and database server experienced the most impact.
- **Unusual Network Traffic:** Suspicious incoming connections were noted from specific IP ranges. Thousands of connection attempts per minute from unusual IP addresses maxed out bandwidth.
- **Load Balancer Issues:** The load balancer struggled, and some servers crashed and rebooted.
- **Compromised VPN Gateway:** Remote users reported connection drops, indicating the VPN gateway was affected.
- **DNS Server Strain:** The DNS server was bombarded with requests for random subdomains.
- **Email Server Issues:** The email server showed unusual traffic and delivery delays.

### Affected Equipment
- **Web Server:** Dell PowerEdge R740
- **Database Server:** HPE ProLiant DL380 Gen10
- **Load Balancer:** F5 Networks BIG-IP 2000 Series
- **Firewall:** Cisco Firepower 2100 Series
- **Router:** Cisco ASR 1000 Series Aggregation Services Router
- **Switch:** Cisco Catalyst 9300 Series
- **Content Delivery Network (CDN):** Akamai Adaptive Media Delivery (Cloud-based)
- **DNS Server:** Infoblox DDI Appliance
- **Email Server:** Microsoft Exchange Server 2019 (Running on VMware)
- **VPN Gateway:** Palo Alto Networks Global Protect

### Cyber Actors
- **APT 33:** Considered a strong candidate due to their focus on sectors like Nexora Dynamics (aerospace, energy, manufacturing) and use of PowerShell-based backdoors and spear-phishing. "*Given their preference for leveraging wiper malware and disruptive attacks, it seems possible they could be involved.*"
- **APT 34 (OilRig):** Another likely suspect due to their targeting of similar industries, credential harvesting techniques, and lateral movement using legitimate admin tools. "*Their techniques often involve credential harvesting and lateral movement using legitimate admin tools, similar to what we're observing here.*"
- **APT 28 (Fancy Bear) and APT 29 (Cozy Bear):** Considered less likely, though not entirely ruled out, due to their typical focus on government and diplomatic entities.

### Attack Vectors
- **Initial Breach:** Began with a spear-phishing email to a contractor ("*Week 1, 10:15 AM* : Initial access to the network was established through a phishing email sent to a contractor."). The email contained a malicious macro-enabled document that opened a reverse shell via PowerShell.
- **Credential Theft:** "*Week 1, 3:30 PM*: The attackers escalated privileges on the compromised contractor's laptop using Mimikatz to dump credentials."
- **Lateral Movement:** "*Week 2, 1:00 AM*: Attackers began lateral movement across the internal network, using RDP and SMB to access other systems."
- **Persistence:** "*Week 3, 4:45 AM*: A series of scheduled tasks were created on various servers to maintain persistence."
- **Reconnaissance:** "*Week 4, 9:15 PM*: Attackers started scanning the network to identify additional targets and map out the entire environment. They conducted internal recon using tools like Nmap to find other systems and services they could exploit."
- **Privilege Escalation:** "*Week 5, 2:30 AM*: After mapping out their targets, the attackers used pass-the-hash attacks to access systems without having to break password hashes."
- **Command & Control:** "*Week 7, 12:15 PM*: Noticed a spike in encrypted outbound traffic to a known Cobalt Strike C2 server."
- **Disabling Security Tools:** "*Week 9, 5:45 AM*: Multiple machines showed disabled security tools and services. The attackers seemed to systematically turn off antivirus programs and firewalls on key servers to avoid detection and leave backdoors open."
- **Data Exfiltration:** "*Week 12, 1:30 PM*: Data exfiltration started on a larger scale."
- **Log Wiping:** "*Week 13, 11:00 PM*: The final phase involved wiping logs and clearing traces on most of the compromised machines."

## 5. Root Cause Analysis (vulnerabilities)

- **Phishing Vulnerability:** Lack of effective email filtering and user awareness training allowed the initial phishing attack to succeed.
- **Cached Credentials:** "*Storing admin credentials insecurely on end-user devices is an oversight*." The presence of cached admin credentials on the contractor's laptop allowed for immediate privilege escalation.
- **Weak Endpoint Security:** Existing endpoint detection and response (EDR) solution failed to detect malicious activity and the installation of persistent backdoors.
- **Inadequate Monitoring and Alerting:** The existing monitoring and alerting system failed to correlate events and detect unusual patterns in a timely manner.
- **Patch Management:** Vulnerable services unpatched allowed the attacker to move through the network.

## 6. Recommendations (mitigations)

- **Advanced Email Filtering and User Training:** Improve email filtering and provide regular security awareness training, especially for contractors.
- **Multi-Factor Authentication (MFA):** Enforce MFA, especially for remote contractors, to prevent credential theft.
- **Disable Cached Credentials:** Disable cached admin credentials on contractor and remote devices.
- **Network Segmentation:** Implement internal firewalls or VLANs to isolate different systems and departments.
- **Role-Based Access Control (RBAC) and Privileged Access Management (PAM):** Implement RBAC and PAM to control admin privileges more tightly and monitor for privilege escalation.
- **Endpoint Detection and Response (EDR):** Upgrade to an EDR solution that can detect suspicious activities.
- **Application Whitelisting:** Prevent unauthorized tools from running.
- **Automated Patch Management:** Automate patching for critical systems.
- **Regular Vulnerability Assessments:** Conduct regular vulnerability assessments to identify potential weak spots.
- **Intrusion Detection/Prevention Systems (IDS/IPS):** Implement IDS/IPS to catch lateral movement and unusual network activity.
- **Security Information and Event Management (SIEM):** Implement a SIEM solution for correlating logs across systems.
- **Penetration Testing:** Conduct periodic penetration testing to simulate real-world attacks and validate the effectiveness of defenses.
- **Incident Response Training:** Conduct incident response training and update the incident response plan.

## 7. Conclusion

Nexora Dynamics faced a sophisticated and persistent cyberattack that exploited multiple vulnerabilities in its security infrastructure. The quick identification of these vulnerabilities and the subsequent development of comprehensive mitigation strategies are crucial steps toward improving the company's overall security posture and preventing future incidents.

# Notes

# CIO Company Address

## CIO Update

### Network Issues
    - Slowdowns
    - Webpages taking forever to load
    - Difficulty accessing services or complete downtime
    - servers randomly crashing & rebooting without any clear Explanation
    - Spike in network traffic & bandwitdth
    - Infastructure strain
    - Revenue loss
    - Potential client distrust & client loss

### Notes
    - Possible Denial of Service Attack
        - Competitor to steal business?
        - Nation State Actor?
            - Clients are private sector, government, and infastructure, trasnportation, and energy. 
            - Possibly they want to disrupt critical services and criple economy.

# Introduction to Advanced Persistent Threats

Email from John Carter to Fellow IT Team

Potential Cyber Threat Actors responsible for the attack impacting Nexora Dynamics

APT - Sophisticated Cyebr Attackers that operate golablly each with their own targets tools and motivations 

Four Groups:
    APT 33 - Elfin
        Originating from Iran
        Focuses on Sectors like Energy, aerospace, petrochemcials, and manufacturing
        Main motivation is Espionage and disruption of critical infastructure, particular interest in middle east and the western world 
        Attack Vectors: 
            Spear Phishing 
                (Highly Targeted Emails that exploit vulnerabiliteis in attachements or links putting malware directly on the victims systems.) Powershell based malware to enable persistent backdoors into victims systems. 
            Credential Harvesting and Lateral Movement
                Once inside use tools to steal credentials and move laterally. Known to deploy destructive wiper malware
    APT 28 - Fancy Bear
        Russia Based Group
        Targeting government entities, political organizations, media outlets, and defense contractors
        Attack Vectors:
            Spear Phishing
            Credential Theft
                Use social engineering to steal credentials to high profile accounts
            Toolkit of sophisticated malware 
                Espionage, Remote Access,
            C2 Infastructure
            Politically Motivated   
    APT 34 - OilRig
        Iran Linked group
        Targets financial Sector, telecommunications, government agencies, and energy firms
            Emphasis on middle eastern companies, and their allies. 
        Attack Vectors:
            Phishing 
                Use social engineering tactics to compromise networks 
            Credential Harvesting
                Gather user credentails
            WEb based Exploits and VPN attacks 
                Exploit vulnerabilites in web applications and vpns to gain access to internal systems. 
                Allows them to remain hidden while they gather intelligence
            Custom Backdoors and Scanning Tools
                Used to maintain access 
                Also known for their lateral movement capabilities 
                Find high value targets 
            Espionage, Survillence, long term footholds in network
    APT 29 - Cozy Bear
        Russian Linked Group
        Known for is stealthy focus on government agencies, dimplocatic institutions, and think tanks
        High rofile espionage campaigns aimed at gathering intelligence from werstern targets
        Attack Vecotrs:
            Sohpicsticated Speat Phishing
                Deploy Advanced Malware, through attachments or cloud services, 
            Supply Chain Attacks
            Infiltrate Third party vendors to reach tehir targets
            Custom malware and advanced persistence
                Invade detection and maintain longterm access
                Living Off the Land Techniques
            CLoud servies and legitimate software to blend in with network traffic
            Difficult to detect thier activiteis

# Equipment

Key Infastructure Imacated, Integral to both inertnal operationbs and external system delivery

Web Server puiblic facing application
    Substancial delays in response times and service availablitlity to to abnormla traffic volumes
    Increase page load times and intermittented unavailabliltiy 
Database Server | proccessing and storing critical business data
    Resource exhaustion
    CPU and Memory usuage spiked significantly during the period of disruption leading to crashes and data restrieval issues
Load Balancer
    unable to handle the suddent increase in incoming requests
    system strugled to maintain an even distribution causing some servers to become overwhelmeed while other remained under utalized
Firewall
    Has been under heacvy strain due to to the high volume of incoming connection attempts
    Many were flagged as suspicious
    proccesing and inspection processes caused bottlenecks 
        further contributing to system slowdowns
Router
    handling a significant amount of unexpected traffic
    resulted in packet loss and increased latency
    distrupted data flow and contributed to network instability
switch
    experienced congestion due to excessive traffic between devices
    Delays in internal communications and degraded performance or critical internal applications
Contend Delivery Network (CDN)
    Responsible for distributing content to users has experienced significant delays in delivering services to clients
    Unuasally high traffic volumes have overburdened the CDNs capactity causing delys and occasianl time outs in content delivery
DNS Server
    Heaveliy targeted leading to disruptions in resolving domain names to ip addresses 
    Caused widespread connectivity issues in both internal and extneral users
Email Server
    Significant backlog of emails and delays in delivery due to netwokr congestions
    impacted internal communication and delayed responses to external queryies 
VPN Gateway
    Responsible for managing secure remote connections has been intermittenlty inaccessible 
    Influx of connection attempts overloaded the gateway affecting access for employees and partners

# Interviews

## Sarah

### About
    - Employee
    - Describes challanges she has recently faces with Nexora network and web server.
#### Notes
    - Network Slow
    - Affects productivity
    - Tasks such as sending and email or accessing files take longer than they should
    - Webserver was working one day and then stopped the next
        - No one could access it
    - Lots of disruption
    - Access to workday & benefits are inconsistent and sometimes does not load
## John Carter

### About
    - Employee | Junior Network Engineer
    - Update on his oversvations regarding the network issues
    - Started 1 Week ago

#### Notes
    - Noticable slowdown on network
    - webpages taking much longer to load than usual
    - Users reported difficulty accessing services
        - Few cases sevice unavailable errors
    - Sudden spike of traffic from a range of IP Addresses that do not typically interact with the network
    - Bandwidth usage unusally high
        - No increase in legitimate user activity
    -Possiblity of more down time & performace issues

##### Oberservations
    - Increase Network Traffic
    - Slow and unresponsive web traffic and devices
    - Productivity lowered
        - Denial of service by increasing network traffic to a point of inusability

# Docs

# Threat Actor Email

**From:** John Carter (IT Supervisor)  
**To:** Sarah Barnes (System Administrator), Lisa Reynolds (Network Administrator)  
**CC:** IT Security Team

Hi Sarah, Lisa,

Thank you both for all the hard work in getting to the bottom of this incident. Given the indicators we’ve found—spear-phishing emails, PowerShell-based backdoors, and the subsequent lateral movement—it’s becoming crucial to determine which threat actors are capable of deploying such a sophisticated attack on Nexora Dynamics.

Based on what we know, I’d like to hear your thoughts on which APT groups could be responsible for this breach. Specifically, we should consider threat actors who have the means, motivation, and methods aligned with what we’re seeing.

Some potential groups that come to mind include:

- **APT 33**: Their history of targeting organizations in the aerospace, energy, and manufacturing sectors, along with their known use of spear-phishing, PowerShell scripting, and credential theft, makes them a prime suspect. Given their preference for leveraging wiper malware and disruptive attacks, it seems possible they could be involved.
- **APT 28 (Fancy Bear)**: Known for cyber-espionage and deploying highly targeted attacks, especially on government and corporate entities. They have a history of leveraging spear-phishing campaigns and sophisticated backdoors.
- **APT 34 (OilRig)**: Another group often linked to targeting industries similar to ours. They have been known to use PowerShell extensively and conduct credential-harvesting attacks similar to what we’re seeing. Their focus on Middle Eastern and global energy sectors might make them a candidate.
- **APT 29 (Cozy Bear)**: Their tactics often involve quiet, persistent access with the aim of gathering intelligence over time. They’re adept at moving laterally within a network and using stealthy methods to exfiltrate data.

Given that we haven’t seen an outright ransomware attack or clear financial motivation, it’s likely we’re dealing with either a nation-state actor or an APT with a strategic interest in our sector. Let me know your thoughts on these possibilities or if you believe another threat actor could be involved.

Understanding the likely threat actor is critical in determining how to respond effectively and prevent further attacks. Any additional insights on their TTPs or motivations would be invaluable as we put together a defense and recovery strategy.

Thanks,  
John

**From:** Sarah Barnes (System Administrator)  
**To:** John Carter (IT Supervisor), Lisa Reynolds (Network Administrator)  
**CC:** IT Security Team

Hi John, Lisa,

Based on what we’ve seen so far, I’d agree that **APT 33** is a strong candidate given their known focus on sectors similar to ours and their use of PowerShell-based backdoors. Their track record of using spear-phishing to gain initial access and then deploying malware to spread within the network aligns closely with what we're experiencing.

That said, I wouldn’t rule out **APT 34 (OilRig)** either. They have been quite active and have a known preference for targeting the same industries. Their techniques often involve credential harvesting and lateral movement using legitimate admin tools, similar to what we’re observing here.

While **APT 28 (Fancy Bear)** and **APT 29 (Cozy Bear)** are always worth considering given their sophisticated capabilities, their recent activity seems to focus on government and diplomatic entities, which makes them slightly less likely than the others mentioned. However, it’s possible that they could have motives aligning with our industry, especially if they are pursuing intelligence-gathering objectives.

If I were to prioritize, I’d say APT 33 and APT 34 are the most likely suspects based on their TTPs and the nature of our organization. I’ll start gathering more intel on their recent activity to see if anything matches up directly with what we’ve been seeing.

Let me know if there’s anything specific you'd like me to focus on.

Best,  
Sarah

**From:** Lisa Reynolds (Network Administrator)  
**To:** John Carter (IT Supervisor), Sarah Barnes (System Administrator)  
**CC:** IT Security Team

Hi John, Sarah,

I agree with both of you on **APT 33** being a likely candidate. The tactics of using spear-phishing to gain entry, followed by fileless malware like a PowerShell backdoor, are in line with what we know of their playbook. Their interest in critical infrastructure and energy-related sectors also makes sense given our organization's profile.

I’d add that **APT 34 (OilRig)**’s known use of **custom backdoors and VPN exploits** could fit our incident as well. Their history of targeting supply chains and service providers in industries like ours makes them a good fit for further investigation. They’re known for deploying a mix of custom and commodity malware, which could explain the combination of tools we’ve found so far.

I’ll dig deeper into any network signatures or known IoCs specific to APT 33 and APT 34 to see if we can make a more definitive match. We might also want to consider any geopolitical tensions or motives that would make our organization a higher priority for these actors.

I’ll keep gathering more details and share anything relevant as it comes up.

Thanks,  
Lisa

# Equipment Email

All,

Just wanted to report on the list of IT equipment impacted by the recent network issues, including make, model, and serial numbers for each. Please review the details below and let me know if any additional information is required for troubleshooting.

1. **Web Server**
    - **Make**: Dell PowerEdge R740
    - **Model**: PER740XA2
    - **Serial Number**: DCH45T9P8Q0
2. **Database Server**
    - **Make**: HPE ProLiant DL380 Gen10
    - **Model**: DL380-G10-XL
    - **Serial Number**: USE689PR4C1
3. **Load Balancer**
    - **Make**: F5 Networks BIG-IP 2000 Series
    - **Model**: BIG-IP i2600
    - **Serial Number**: F512AX97R3
4. **Firewall**
    - **Make**: Cisco Firepower 2100 Series
    - **Model**: FPR-2110
    - **Serial Number**: CFP212345C
5. **Router**
    - **Make**: Cisco ASR 1000 Series Aggregation Services Router
    - **Model**: ASR1001-HX
    - **Serial Number**: CASR10X689A
6. **Switch**
    - **Make**: Cisco Catalyst 9300 Series
    - **Model**: C9300-24P-E
    - **Serial Number**: CAT9356YPQ2
7. **Content Delivery Network (CDN)**
    - **Make**: Akamai Adaptive Media Delivery (Cloud-based)
    - **Model**: N/A (Cloud Service)
8. **DNS Server**
    - **Make**: Infoblox DDI Appliance
    - **Model**: Trinzic 1410
    - **Serial Number**: TZN76423X98
9. **Email Server**
    - **Make**: Microsoft Exchange Server 2019 (Running on VMware)
    - **Model**: N/A (Virtualized)
10. **VPN Gateway**
    - **Make**: Palo Alto Networks GlobalProtect
    - **Model**: PA-5220
    - **Serial Number**: PANGP52321K

Let me know if you need any further details for logging or inventory purposes.

Best regards,  
John Carter  
IT Engineer, Nexora Dynamics

# Attack Symptoms

**Email 1: From Lisa Reynolds (Network Administrator) to John Carter**

**Subject:** Urgent: Network Slowdown and Unusual Traffic

Hi John,

We’re seeing major slowdowns across multiple systems. I’ve received reports from both users and monitoring tools. It looks like the web server and the database server are getting hit the hardest right now. I checked the traffic logs, and there are a lot of suspicious incoming connections from the following IP ranges:

- 192.168.45.0/24
- 203.123.155.200
- 45.76.19.132

It looks like the load balancer is struggling too, and a couple of servers crashed earlier today and rebooted. Can you take a look at the firewall and router traffic on your end? This might be more than a typical traffic spike.

Thanks,  
Lisa Reynolds  
Network Administrator

**Email 2: From John Carter (Mid-Level IT Engineer) to Lisa Reynolds, Alex Torres (Security Analyst), and Sarah Barnes (System Administrator)**

**Subject:** RE: Urgent: Network Slowdown and Unusual Traffic

Hi Team,

Thanks for the heads-up, Lisa. I just pulled some data from the firewall and router logs. The firewall is getting hammered with requests from the IP addresses you mentioned, and I’m seeing a bunch of others as well:

- 198.51.100.45
- 64.233.187.99
- 103.45.89.223

These IPs are making thousands of connection attempts every minute. Our bandwidth is completely maxed out, and I think it’s spilling over to affect the VPN gateway too—remote users are reporting connection drops. We may need to start blocking some of these IPs at the firewall level immediately.

Alex, can you cross-reference these IPs with any known malicious actors? Sarah, can you check on the DNS and email servers? There are likely other systems being affected that we haven't caught yet.

Let’s regroup after you’ve had a chance to review the data.

Best,  
John Carter  
Mid-Level IT Engineer

**Email 3: From Alex Torres (Security Analyst) to John Carter, Lisa Reynolds, and Sarah Barnes**

**Subject:** RE: Urgent: Network Slowdown and Unusual Traffic

Hey team,

I just checked the IPs that John and Lisa listed, and several of them are flagged in our threat intelligence database as being part of known botnet activity. Here’s the breakdown:

- **203.123.155.200**: Identified as part of the Mirai botnet.
- **45.76.19.132**: Previously associated with DDoS activity targeting financial institutions.
- **103.45.89.223**: Blacklisted due to frequent brute-force attack attempts.

This is definitely coordinated, and it looks like they’re targeting multiple layers of our infrastructure. I recommend we move forward with blocking these IPs and maybe even implement rate-limiting on the load balancer. Let me know if I should proceed.

Alex Torres  
Security Analyst

**Email 4: From Sarah Barnes (System Administrator) to John Carter, Lisa Reynolds, and Alex Torres**

**Subject:** RE: Urgent: Network Slowdown and Unusual Traffic

Hi All,

I’ve checked the DNS and email servers, and both are showing significant strain. The DNS server has been getting bombarded with requests for random subdomains, which is likely contributing to the slowdowns. The email server is also showing unusual traffic, and there are some delays in delivery.

I’m working on clearing the queue for the email server, but we might need to offload some of this traffic before it gets worse. Should we also look into adjusting DNS settings to filter out some of the bad traffic? Let me know if there’s anything else I can assist with.

Sarah Barnes  
System Administrator

**Email 5: From John Carter to Lisa Reynolds, Alex Torres, and Sarah Barnes**

**Subject:** RE: Urgent: Network Slowdown and Unusual Traffic

Thanks for the quick responses, everyone. Let’s go ahead and start with blocking those malicious IP addresses on the firewall, and Alex, go ahead with the rate-limiting setup on the load balancer. Sarah, adjusting the DNS settings to filter out the bogus requests sounds like a good move. Once we’ve got these measures in place, we should monitor for further spikes and reconvene if the situation escalates.

I’ll update management with our progress. Let’s stay on this and continue collaborating. Thanks again for jumping on it so quickly.

Best,  
John Carter  
Mid-Level IT Engineer

# Company Info

**Company Name**: Nexora Dynamics

**Industry**: Engineering Services

**Company Size**: Medium-sized enterprise (250-500 employees)

**Headquarters**: Baltimore, MD

**Established**: 2008

**Company Overview:**

Nexora Dynamics is a leading provider of cutting-edge engineering services, specializing in advanced technology solutions for industries such as aerospace, defense, energy, and infrastructure. With a focus on innovation, Nexora Dynamics offers a range of services, including systems design, testing, and operational support, tailored to meet the needs of both private sector clients and government agencies.

As a medium-sized firm, Nexora Dynamics maintains agility and a customer-first approach while delivering robust solutions that rival those of much larger competitors. The company’s mission is to empower clients with high-quality engineering solutions that drive efficiency, sustainability, and technological advancement.

**Core Services:**

1. **Systems Engineering**:
    - Design and implementation of complex systems across various industries, ensuring integration, performance, and reliability.
2. **Product Development & Testing**:
    - Full product lifecycle support, from initial concept to prototyping, testing, and production readiness.
3. **SCADA Systems & Automation**:
    - Expertise in SCADA (Supervisory Control and Data Acquisition) systems, with a focus on automation and control systems for critical infrastructure.
4. **Cybersecurity & Risk Management**:
    - Comprehensive OT (Operational Technology) security assessments, vulnerability testing, and implementation of robust security measures for critical systems.
5. **Consulting & Technical Support**:
    - Advisory and on-site technical support services for optimizing operations, improving safety standards, and reducing downtime.

**Key Clients:**

- Aerospace and defense contractors
- Energy sector companies (nuclear, oil & gas, renewable)
- Government agencies (Department of Defense, Homeland Security)
- Infrastructure and transportation companies

**Company Vision:**

To be the trusted partner for organizations seeking innovative engineering solutions that solve complex challenges and propel them into the future. Nexora Dynamics is committed to fostering a collaborative environment that drives forward-thinking solutions and enables clients to thrive in an increasingly technological world.

**Values:**

- **Innovation**: Continuously pushing the boundaries of technology to provide groundbreaking solutions.
- **Integrity**: Maintaining the highest ethical standards and ensuring transparency in every project.
- **Excellence**: Delivering superior results by investing in top talent and cutting-edge tools.
- **Customer Focus**: Building lasting relationships by consistently exceeding client expectations.

**Leadership Team:**

- **CEO**: **Emily Lawson**  
    Emily brings over 20 years of leadership experience in the engineering and technology sectors. She is responsible for overseeing the company’s strategic direction and growth.
- **COO**: **David Chen**  
    David manages day-to-day operations, ensuring that Nexora Dynamics consistently delivers on its promises to clients, from project execution to customer satisfaction.
- **CTO**: **Sophia Martinez**  
    Sophia leads Nexora’s technology strategy, focusing on innovation, research and development, and the integration of emerging technologies in engineering services.
- **Head of Engineering**: **Mark Thompson**  
    Mark oversees all engineering projects, ensuring technical excellence and adherence to industry standards. He works closely with clients to understand their needs and deliver solutions that exceed expectations.
- **CIO (Chief Information Officer)**: **Jordan Steele**  
    Rachel is responsible for managing Nexora’s cybersecurity strategies, protecting both internal systems and client infrastructure from evolving cyber threats.

**Office Location:**

**Nexora Dynamics**  
3200 Innovation Parkway  
Suite 500  
Baltimore, MD 21201  
United States