<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Incident response - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/incident-response/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/incident-response/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 29 Apr 2026 12:44:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Incident response - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/incident-response/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>StormCell: How our blue team scales up incident response</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/#respond</comments>
		
		<dc:creator><![CDATA[Clément Gonnaud]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 12:10:04 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[CERT-W Stormcell]]></category>
		<category><![CDATA[CERT-Wavestone]]></category>
		<category><![CDATA[Cyber incident response]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Indicators of Compromise]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[IoC]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Windows Forensics]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29788</guid>

					<description><![CDATA[<p>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes, from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: attackers are more sophisticated than...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes,</strong> from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: <strong>attackers are more sophisticated than ever, and every hour matters for blue teams.</strong></p>
<p style="text-align: justify;">When CERT-Wavestone is called, three priorities drive every action and decision making:<strong> containing the threat, understanding the attack and eradicating the attacker.</strong> To achieve these objectives,<strong> establishing visibility</strong> across the impacted perimeter is the <strong>critical first step</strong>.</p>
<p style="text-align: justify;">In such contexts where<strong> speed and effectiveness are mandatory,</strong> CERT-Wavestone relies on many tools: cybersecurity solutions (EDR, SIEM, etc.), open-source collectors and parsers, and its own internally developed tools.</p>
<p style="text-align: justify;">Among these, <strong>StormCell stands out as an open-source tool developed by CERT-Wavestone</strong> to automate Windows triage processing and<strong> free analysts’ time to focus on what truly matters: the investigation itself.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Contain. Understand. Eradicate. Every hour counts.</h2>
<h3 style="text-align: justify;">Increasingly effective attackers</h3>
<p style="text-align: justify;">Several cybersecurity incident response actors agree that <strong>certain types of cyberattacks</strong>, such as ransomware and data exfiltration attacks, <strong>are becoming increasingly fast paced.</strong> The charts published by Zero Day Clock (<span style="color: #451dc7;"><a style="color: #451dc7;" href="https://zerodayclock.com">https://zerodayclock.com</a></span>) illustrate this trend:</p>
<ul style="text-align: justify;">
<li><strong>A growing share of zero day vulnerabilities are being actively exploited each year</strong>, rising from 16% in 2018 to 71% in 2026,</li>
<li><strong>A decreasing time to exploit</strong> (TTE) for these vulnerabilities is noted, falling from several years in 2018 to less than one day in 2026.</li>
</ul>
<p style="text-align: justify;">This is also a <strong>commonly shared observation among Wavestone’s incident response team</strong> in its latest annual report (see: <a href="https://www.wavestone.com/en/insight/2025-wavestone-cert-report/"><span style="color: #451dc7;">CERT-Wavestone annual report</span></a>), which is based on a set of around twenty major incidents affecting Wavestone clients during 2025:</p>
<figure id="attachment_29792" aria-describedby="caption-attachment-29792" style="width: 1688px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="size-full wp-image-29792" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/1-Ransomware-An-end-to-end-attack-in-15-days-e1776342358749.png" alt="Ransomware - An end-to-end attack in 1,5 days" width="1688" height="943" /><figcaption id="caption-attachment-29792" class="wp-caption-text"><em>Ransomware &#8211; An end-to-end attack in 1,5 days</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">As a result, to contain and remediate incidents as early as possible our incident response team <strong>must be effective in its analysis and decision‑making</strong>. This requires an especially <strong>quick understanding of the context and of the incident.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The anatomy of a CERT-Wavestone investigation</h2>
<p style="text-align: justify;">Each CERT-Wavestone investigation typically begins with a limited scope before rapidly expanding to cover dozens of systems as the situation evolves:</p>
<ul style="text-align: justify;">
<li><strong>Stage 1 — Initial analysis:</strong> Once the perimeter is secured and initial containment measures are in place, CERT-Wavestone is engaged and assesses the situation on a <strong>handful of suspicious or confirmed compromised machines.</strong> If the client has a SOC or CERT, existing telemetry and detection tooling provide an immediate starting point. If not, CERT-Wavestone leverages available resources to perform initial forensic collections and <strong>outline an initial overview of the attack.</strong></li>
<li><strong>Stage 2 — Broader investigation:</strong> As the killchain becomes clearer, the investigation expands to dozens of compromised machines. When the client’s infrastructure cannot support <strong>large-scale acquisitions,</strong> CERT-Wavestone <strong>deploys its own forensic collection tool to gather triage data efficiently.</strong></li>
<li><strong>Stage 3 — IoC hunting across the entire IS:</strong> Indicators of compromise are established, and the search extends to the entire information system. If not already in place, <strong>EDR or alternative tools can be deployed by CERT-Wavestone</strong>. Large-scale IoC sweeps rely on the built-in capabilities of the EDR, SIEM or log collection platforms.</li>
</ul>
<p style="text-align: justify;">Whether on Stage 1 or Stage 2, each collection requires the<strong> same standardized pipeline:</strong> retrieval, parsing, ingestion, Indicator of Compromise (IoC) identification, and cross-collection correlation. Consequently, <strong>manual forensic processing consumes valuable time and effort,</strong> forcing analysts to handle routine data operations instead of focusing on investigations.</p>
<p style="text-align: justify;"><strong>Handling each collection individually</strong> by each analyst <strong>is slow, prone to errors and discrepancies,</strong> and <strong>poorly scales</strong> to the <strong>number of machines</strong> to investigate, and the<strong> number of analysts</strong> mobilized on the incident.</p>
<p style="text-align: justify;"><strong>This is precisely the problem that StormCell, a tool developed by the CERT-W, was designed to solve.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : what is it ?</h2>
<p style="text-align: justify;">StormCell is a tool developed by CERT-Wavestone to address a <strong>long-standing need:</strong> a Windows forensic analysis orchestrator that <strong>adapts to multiple investigation contexts, automates the end-to-end processing of triage data</strong> from artifact extraction to centralized ingestion into a SIEM platform, and frees analysts to <strong>focus on the investigation</strong>, not the pipeline.</p>
<p style="text-align: justify;">Developed in Python to make it easy to use, <strong>the tool was recently published on GitHub</strong> so that the entire incident response community can access it as open source: <strong><span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">https://github.com/CERT-W/StormCell</a></span></strong>. <strong>CERT‑Wavestone intends for this tool to be used, tested, and improved directly by the community.</strong></p>
<p style="text-align: justify;">Although other similar tools have been developed and released since the beginning of its development, <strong>StormCell stands out through its modularity and its underlying technology choices, both geared towards speed and adaptability.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Three key stages : ingest, process and enrich, centralize</h3>
<p style="text-align: justify;">StormCell’s workflow is based on three key stages:</p>
<figure id="attachment_29799" aria-describedby="caption-attachment-29799" style="width: 1750px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-29799 size-full" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png" alt="Three key stages - Ingest, Process and Enrich, Centralize_old" width="1750" height="774" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png 1750w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-432x191.png 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-768x340.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-1536x679.png 1536w" sizes="(max-width: 1750px) 100vw, 1750px" /><figcaption id="caption-attachment-29799" class="wp-caption-text"><em>Three key stages &#8211; Ingest, Process and Enrich, Centralize</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To properly perform those steps, StormCell relies on several third-party tools : whether it is for artifacts collection with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://www.kroll.com/en/services/cyber/incident-response-recovery/kroll-artifact-parser-and-extractor-kape">Kape</a></span>, enrichment and ingestion of logs into a SIEM with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://vector.dev/">Vector</a></span> or SIEM built-in functionalities with <a href="https://www.splunk.com/"><span style="color: #451dc7;">Splunk</span></a> or <a href="https://www.elastic.co/fr/elastic-stack"><span style="color: #451dc7;">ELK</span>.</a></p>
<p style="text-align: justify;">Despite these dependencies, <strong>the tool only needs to be installed and configured once on a single workstation before it can be used throughout the incident response by all analysts.</strong></p>
<p> </p>
<h3 style="text-align: justify;">Extract and Ingest</h3>
<p style="text-align: justify;">StormCell is designed to work with <strong>two types of forensics collections:</strong> disk images and artifact ZIP extracts produced by Kape.</p>
<p style="text-align: justify;">When StormCell is run against a disk image, it directly <strong>uses Kape to extract the relevant artifacts.</strong></p>
<p style="text-align: justify;">Compatible ZIP archives can also be generated with the CERT‑Wavestone tool <a href="https://github.com/CERT-W/CollectRaptor"><span style="color: #451dc7;">CollectRaptor</span></a>, which is based on Velociraptor, or with any other collection performed using the Velociraptor KapeTarget module.</p>
<p> </p>
<h3 style="text-align: justify;">Process and Enrich</h3>
<p style="text-align: justify;">Once raw artifacts are extracted, the core of the processing chain comes into play: <strong>the artifacts are processed with Kape.</strong></p>
<p style="text-align: justify;">Kape is used because it is a <strong>tool dedicated to Windows forensics artifacts parsing</strong>. It allows, through modules, to automatically execute several tools such as the <a href="https://ericzimmerman.github.io/#!index.md"><span style="color: #451dc7;">Zimmerman Suite</span></a>, <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Yamato-Security/hayabusa">Hayabusa</a></span> or even <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/WithSecureLabs/chainsaw">Chainsaw</a></span>. Moreover, logs parsed by Kape are <strong>directly organized on the filesystem by artifact category</strong> (executions, filesystem, registries, etc.) allowing to perform efficient local and manual analysis whenever necessary.</p>
<p style="text-align: justify;">As a whole, StormCell <strong>uses Kape to run more than thirty artifact‑processing tools</strong>, each covering a complementary analysis scope and <strong>ensuring a high level of exhaustiveness for the elements available to analysts.</strong></p>
<p style="text-align: justify;">All these tools <strong>can be easily downloaded through the StormCell installation command</strong> described in its Readme. <strong>StormCell’s modular configuration</strong> also makes it <strong>simple to integrate new artifact‑processing tools as needed.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Centralize</h3>
<p style="text-align: justify;">Once the artifacts have been parsed by Kape,<strong> the generated logs are normalized, enriched, and sent to a SIEM platform through Vector,</strong> an open‑source tool <strong>particularly well‑suited to handling large volumes of data.</strong></p>
<p style="text-align: justify;">To determine which artifacts to send, as well as the normalizations and enrichments to apply, <strong>Vector relies on its TOML configuration files. These files include parsers that structure raw data into meaningful fields, and sinks (output destinations) that route events to the target environment,</strong> whether a client’s ELK or Splunk instance, or an internal ELK instance dedicated to CERT‑Wavestone.</p>
<p style="text-align: justify;">To retrieve these configurations, <strong>StormCell uses the configuration files from the GitHub repository <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Qazeer/Vector4IR">Vector4IR</a> </span></strong>whose CERT‑Wavestone is a contributor.</p>
<p> </p>
<h3 style="text-align: justify;">A major time-saver for analysts</h3>
<p style="text-align: justify;">By chaining these three stages together, <strong>each forensic collection only needs to be processed once before it becomes available in the SIEM for all analysts</strong>. This makes it possible to carry out global investigations while fully <strong>leveraging the built‑in capabilities of SIEM technologies:</strong> search languages, dashboards and saved searches, lookups and data tables, correlation features, and so on.</p>
<p style="text-align: justify;">The retrieval of collections and their<strong> handling with StormCell can be handled by a single analyst, while the others can already begin investigating in real time</strong> as the logs are being sent.</p>
<p> </p>
<h2 style="text-align: justify;">StormCell execution modes</h2>
<p style="text-align: justify;">According to the setup and configuration details provided in the Readme of the <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">Github repository</a></span>,<strong> a dedicated setup command can be used to download all the tools required</strong> for StormCell to properly operate. In addition, <strong>numerous options,</strong> described in the default configuration file and the help command, <strong>are available to accommodate different execution requirements.</strong></p>
<p style="text-align: justify;">For example, <strong>it is possible to specify which Kape modules should run, or to force a fresh processing and re‑ingestion of logs.</strong> Because StormCell <strong>uses a local database file to maintain state across successive executions,</strong> its behavior can be completely reset by removing this database.</p>
<p style="text-align: justify;">Finally, StormCell offers <strong>three complementary execution modes,</strong> designed to adapt to every investigation context, from small scopes to large‑scale crises, and to let analysts be operational as quickly as possible, regardless of the types of resources available to them.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Once mode: small scopes and need for rapid investigation</h3>
<p style="text-align: justify;"><strong>Designed specifically for targeted investigations</strong> on a limited scope, this mode <strong>handles a set of preexisting collections in a single execution.</strong></p>
<p style="text-align: justify;">After an initial configuration by the analysts, <strong>the tool executes and enables the analysis of the collections without any additional steps.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mountpoint mode: local collect and analysis in a single command</h3>
<p style="text-align: justify;">Mountpoint is StormCell’s end‑to‑end execution mode:<strong> from collecting artifacts on a disk or a locally mounted forensic copy all the way to sending them into the SIEM.</strong></p>
<p style="text-align: justify;">This mode is preferred when analyzing disk copies, and it <strong>natively includes artifact extraction through Kape’s built‑in capabilities.</strong> Once the extraction is complete, <strong>its behavior is similar to the Once mode.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Loop mode : Continuous processing for large‑scale investigations</h3>
<p style="text-align: justify;">CERT-Wavestone’s preferred mode, it is <strong>designed for large‑scale crises</strong> and aims to enable StormCell to run continuously throughout the incident. Once configured, the tool monitors a designated folder and automatically processes all collections placed there by the analysts.</p>
<p style="text-align: justify;"><strong>This centralized drop‑off folder becomes the logistical core of the investigation:</strong> once it is set up, analysts no longer need to worry about processing collections, whether the incident lasts a few days or several weeks, and<strong> can simply deposit the triage images then access the processed data in the SIEM platform being used.</strong></p>
<p style="text-align: justify;">Finally, <strong>two levels of artifact processing can be configured</strong> to best match analysts’ needs when investigations are carried out <strong>on new machines:</strong></p>
<ul style="text-align: justify;">
<li><strong>Short</strong>: a <strong>lightweight treatment</strong> prioritizing speed, suited to surface‑level analyses that quickly assess a machine and help prioritize investigations.</li>
<li><strong>Long</strong>: an <strong>exhaustive treatment</strong> that activates in‑depth analysis modules, intended for detailed investigations requiring a full view of the machine’s activity.</li>
</ul>
<p style="text-align: justify;"><strong>The modules to be executed in both modes can be freely configured</strong> by the analyst using StormCell. These two complementary modes make it possible to deposit archives initially into the <strong>Short folder to obtain a quick but non-exhaustive list of artifacts</strong>, then later in the investigations, deposit them into the <strong>Long folder to obtain an exhaustive list of artifacts.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : What’s next ?</h2>
<p style="text-align: justify;">StormCell is currently a key tool frequently used within CERT‑Wavestone to accelerate the processing of Windows artifacts during its investigations.</p>
<p style="text-align: justify;"><strong>Its orchestration capabilities are planned to be extended to investigations on Cloud environments, particularly M365, as well as Linux and macOS,</strong> while also exploring the integration of new forensic sources and advanced technologies such as the use of AI.</p>
<p style="text-align: justify;">That’s why CERT‑Wavestone invites you to <strong>contribute to its evolution:</strong> forks, pull requests, and feedback from your operational experience are welcome, so that StormCell can become the most suitable tool possible for incident response needs.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Evenson Jeunesse]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 09:47:27 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Amavis]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Zimbra]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28717</guid>

					<description><![CDATA[<p>It&#8217;s time to begin the second part of our Zimbra investigation. If you haven&#8217;t read the first part yet, we strongly recommend starting HERE before continuing.In this second part, we&#8217;ll assume that an attacker has managed to compromise a Zimbra...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">It&#8217;s time to begin the second part of our Zimbra investigation. If you haven&#8217;t read the first part yet, we strongly recommend starting <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/"><span style="color: #000080;">HERE</span> </a>before continuing.<br />In this second part, we&#8217;ll assume that an attacker has managed to compromise a Zimbra account and that we&#8217;ve already identified their entry point (initial access). We&#8217;ll now analyze how to leverage Zimbra logs to identify the malicious actions the attacker could have carried out from their access. We&#8217;ll then see what remediation measures to implement to prevent this type of incident and respond to it effectively.<br />Get comfortable (and make sure your coffee is still hot): let&#8217;s dive right into the heart of the matter!</p>
<p> </p>
<h2>Investigating in a Zimbra Environment</h2>
<p style="text-align: justify;">Now that Zimbra’s infrastructure and logs <strong>hold no secrets for you</strong>, it’s time to get <strong>practical</strong>.</p>
<p style="text-align: justify;">Imagine you’re a forensic analyst, arriving early one morning, when suddenly: <strong>the phone rings.</strong> You’re being called because several users are reporting that emails, <strong>they didn’t send</strong> are appearing in their “Sent” folder.</p>
<p style="text-align: justify;"><strong>Panic ensues</strong>! Users are afraid to log into their mailboxes, and some administrators start wondering whether the <strong>Zimbra infrastructure itself</strong> might be <strong>compromised</strong>.</p>
<p style="text-align: justify;">Since you know Zimbra inside out, the team naturally turns to you to <strong>investigate this incident</strong>!</p>
<p style="text-align: justify;">As a forensic analyst, many questions come to mind:</p>
<ul style="text-align: justify;">
<li><em>Have the accounts really been compromised? If so, how and since when?</em></li>
<li><em>How many users are affected?</em></li>
<li><em>What is the attacker’s objective, and what malicious actions have been carried out from these accounts?</em></li>
<li><em>Have the mail server or other Zimbra components been compromised?</em></li>
<li><em>And, most importantly: do I have time for a coffee </em><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2615.png" alt="☕" class="wp-smiley" style="height: 1em; max-height: 1em;" /><em> before the information hunt begins?</em></li>
</ul>
<p style="text-align: justify;">To help you in your investigation, we’ll look at how to answer these questions through Zimbra log analysis. But first, here are some tips to guide your investigation.</p>
<p style="text-align: justify;">During incident response, it’s easy to feel <strong>overwhelmed</strong> by the <strong>amount of logs</strong> <strong>and</strong> <strong>events</strong> <strong>to analyze</strong>. Keeping a clear line of reasoning is essential. A few simple practices can help maintain focus:</p>
<ul style="text-align: justify;">
<li><strong>Confirm:</strong> Verify the information that triggered the incident. Before diving deeper, ensure the initial alert is accurate. This undeniable baseline will serve as the foundation for the entire investigation.</li>
<li><strong>Correlate:</strong> Cross-check suspicious IP addresses and domains with other sources (proxy, VPN, EDR, online antivirus databases). This provides additional context related to the identified indicator.</li>
<li><strong>Pivot:</strong> Use the collected information to expand your analysis. An attacker might reuse the same IP address or user-agent across multiple accounts. Conversely, a compromised account might be accessed from different IP addresses or user-agents. Pivoting can reveal other indicators that help identify the attacker.</li>
<li><strong>Compare patterns:</strong> Even without direct access to email content or attachments, certain elements can reveal similarities (file size, identical filenames, repeated sequences of actions after account compromise). This behavioral analysis approach can help identify multiple users compromised by the same attacker. Such hypotheses should be formulated and handled cautiously, but they can be valuable for confirming intuition.</li>
<li><strong>Ensure log preservation:</strong> This may seem obvious, but as soon as an incident is detected, securing the logs is critical. Collect logs immediately from the entire Zimbra infrastructure and extend their retention period to prevent automatic deletion. Because let’s be honest: logs disappearing just as the forensic team arrives is a way too common scenario… one you definitely want to avoid.</li>
</ul>
<p style="text-align: justify;">While these tips <strong>aren’t exhaustive</strong>, they provide a solid foundation for conducting an analysis that is both <strong>fast</strong> and <strong>efficient</strong>.</p>
<p> </p>
<h2>Post-compromise activity</h2>
<h3>Analysis of user activity  </h3>
<p style="text-align: justify;"><strong>What mastery</strong>! You have successfully traced back to the initial entry point used by the attacker to compromise user accounts. You have identified the malicious IP addresses, spotted the User-Agent used, and even uncovered other compromised accounts thanks to this information. In short, clean and efficient work. Impressive!</p>
<p style="text-align: justify;">But… we still haven’t answered a crucial question: &#8220;<em>What was the attacker’s objective, and what actions did they take from the compromised accounts?</em>&#8220;</p>
<p style="text-align: justify;">To find out, you now need to analyze the <strong>attacker’s activity within the Zimbra infrastructure</strong>. Once authenticated, an attacker can indeed:</p>
<ul style="text-align: justify;">
<li>Launch an <strong>internal</strong> or <strong>external</strong> <strong>phishing</strong> <strong>campaign</strong></li>
<li>Send messages aimed at tricking a colleague, partner, or client into taking action (CEO fraud, fictitious urgent requests, etc.)</li>
<li><strong>Exfiltrate sensitive data</strong> from mailboxes</li>
</ul>
<p style="text-align: justify;">In this section, we will examine <strong>some examples of suspicious activities</strong> that can be identified from Zimbra logs.</p>
<p> </p>
<h4>Sending a large number of emails in a short amount of time</h4>
<p style="text-align: justify;">You want to determine whether compromised accounts were used to co<strong>nduct additional phishing attempts</strong> by sending <strong>mass emails</strong> to <strong>internal</strong> or <strong>external</strong> <strong>recipients</strong>. Unfortunately, Zimbra does not provide a native event that allows you to retrieve this information directly. However, a simple <strong>grep</strong> command will get the job done.</p>
<p style="text-align: justify;">The command below extracts the <strong>number of messages sent by each user</strong> over a specific period (here, from <strong>November</strong> <strong>21 to November 27, 2025</strong>):</p>
<figure id="attachment_28721" aria-describedby="caption-attachment-28721" style="width: 1377px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-28721" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_.png" alt="Retrieving the number of emails sent per user (mailbox.log)" width="1377" height="444" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-437x141.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-768x248.png 768w" sizes="(max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28721" class="wp-caption-text"><em>Retrieving the number of emails sent per user (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In this example, <strong>user25@wavestone.corp</strong> clearly <strong>stands out</strong> with a <strong>sending volume far above normal</strong>. An <strong>unusually high volume</strong> of emails sent from a mailbox <strong>over a short period</strong> constitutes <strong>suspicious activity</strong>.</p>
<p style="text-align: justify;">In legitimate use, mass email sending is relatively rare and is generally associated with <strong>generic addresses</strong> or <strong>internal communication systems</strong> (e.g., newsletters, HR announcements). When a standard user account exhibits this type of behavior, it is important to:</p>
<ul style="text-align: justify;">
<li>Determine whether this is normal, recurring activity for the user</li>
<li>Check the sending time frame, IP address, and User-Agent</li>
<li>Verify whether any suspicious attachments were associated with the emails</li>
</ul>
<p style="text-align: justify;">Mass email sending can <strong>trigger built-in protection mechanisms</strong> in Zimbra, including <strong>quota rules</strong>. These thresholds are designed to limit the volume of messages sent by an account over a given period to prevent abuse, spam, or phishing campaigns.</p>
<p style="text-align: justify;">The two commands below allow you to retrieve events related to quota exceedances:</p>
<figure id="attachment_28723" aria-describedby="caption-attachment-28723" style="width: 1378px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28723" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_.png" alt="Retrieval of quota overruns (mailbox.log)" width="1378" height="146" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_.png 1378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-768x81.png 768w" sizes="auto, (max-width: 1378px) 100vw, 1378px" /><figcaption id="caption-attachment-28723" class="wp-caption-text"><em>Retrieval of quota overruns (mailbox.log)</em></figcaption></figure>
<figure id="attachment_28727" aria-describedby="caption-attachment-28727" style="width: 1375px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28727" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_.png" alt="Retrieval of quota overruns (mail.log)" width="1375" height="187" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_.png 1375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-768x104.png 768w" sizes="auto, (max-width: 1375px) 100vw, 1375px" /><figcaption id="caption-attachment-28727" class="wp-caption-text"><em>Retrieval of quota overruns (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">The appearance of error messages related to quota exceedances is a signal <strong>not to be ignored</strong>, because:</p>
<ul style="text-align: justify;">
<li>Either the legitimate user accidentally exceeded a quota</li>
<li>Or the account is being used fraudulently to send mass emails</li>
</ul>
<p style="text-align: justify;">Since this indicator can generate a <strong>large number of false positives</strong>, it is recommended to <strong>correlate it with other information</strong> in order to draw meaningful conclusions.</p>
<p> </p>
<h4>Sending an email to a large number of recipients</h4>
<p style="text-align: justify;">To avoid triggering a quota‑exceedance alert, a more seasoned attacker may adopt a more &#8220;<em>subtle</em>&#8221; strategy. Instead of sending <strong>dozens of individual</strong> emails (a noisy method), they may choose to send a <strong>single message</strong> addressed to a <strong>long list of recipients</strong>: an efficient way to optimize their phishing campaign.</p>
<p style="text-align: justify;">Fortunately for you, Zimbra logs make it possible to identify the <strong>number of recipients associated with each sent email</strong>, which makes this type of maneuver detectable without too much effort.</p>
<p style="text-align: justify;">The commands below allow you to identify emails sent to an unusually <strong>high number of recipients</strong>:</p>
<figure id="attachment_28729" aria-describedby="caption-attachment-28729" style="width: 1377px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28729" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_.png" alt="Retrieval of emails sent to more than 100 recipients (mail.log)" width="1377" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-71x7.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-768x80.png 768w" sizes="auto, (max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28729" class="wp-caption-text"><em>Retrieval of emails sent to more than 100 recipients (mail.log)</em></figcaption></figure>
<figure id="attachment_28731" aria-describedby="caption-attachment-28731" style="width: 1371px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28731" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_.png" alt="Retrieval of emails sent to more than 100 recipients (mailbox.log)" width="1371" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_.png 1371w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-768x104.png 768w" sizes="auto, (max-width: 1371px) 100vw, 1371px" /><figcaption id="caption-attachment-28731" class="wp-caption-text"><em>Retrieval of emails sent to more than 100 recipients (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Here, you can observe that the user <strong>user25@wavestone.corp</strong> sent an email to <strong>211 recipients</strong>. Such behavior is clearly <strong>suspicious</strong>.</p>
<p style="text-align: justify;">In practice, it is <strong>rare</strong> for a <strong>personal email address</strong> to send a message to s<strong>everal dozen recipients simultaneously</strong>. This type of volume is usually associated with <strong>shared mailboxes</strong> or <strong>generic addresses</strong> (e.g., internal communications, HR services, institutional announcements).</p>
<p style="text-align: justify;">When a standard user account exhibits this kind of activity, it is essential to:</p>
<ul style="text-align: justify;">
<li>identify the usual communication practices within the organization</li>
<li>determine whether this sending volume is normal or recurrent for the user in question</li>
<li>examine the time window, IP address, and user agent used during the sending</li>
<li>check if any potentially malicious attachments were associated with the messages</li>
</ul>
<p style="text-align: justify;">To save time, it is often relevant to <strong>confirm directly with the user</strong> whether the sending was legitimate.</p>
<p style="text-align: justify;">The example presented here isolates sends containing <strong>more than 100 recipients</strong>. However, this <strong>threshold should be adjusted</strong> depending on:</p>
<ul>
<li style="text-align: justify;">the usual volume within the organization</li>
<li style="text-align: justify;">the type of accounts involved</li>
<li style="text-align: justify;">and the period covered by the logs analyzed</li>
</ul>
<p> </p>
<h4>Uploading suspicious attachments</h4>
<p style="text-align: justify;">Unlike email reception, the <strong>upload of suspicious attachments</strong> is better logged by Zimbra. Each time a user attaches a file to a new email, Zimbra carefully records the operation in its logs.</p>
<p style="text-align: justify;">Using the commands below, you can <strong>retrieve the attachments added to emails</strong> by a potentially compromised user:</p>
<figure id="attachment_28737" aria-describedby="caption-attachment-28737" style="width: 1374px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28737" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2.png" alt="Retrieval of attachment upload events (mailbox.log) (1/2)" width="1374" height="184" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2.png 1374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-768x103.png 768w" sizes="auto, (max-width: 1374px) 100vw, 1374px" /><figcaption id="caption-attachment-28737" class="wp-caption-text"><em>Retrieval of attachment upload events (mailbox.log) (1/2)</em></figcaption></figure>
<figure id="attachment_28739" aria-describedby="caption-attachment-28739" style="width: 1377px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28739" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2.png" alt="Retrieval of attachment upload events (mailbox.log) (2/2)" width="1377" height="147" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-437x47.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-768x82.png 768w" sizes="auto, (max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28739" class="wp-caption-text"><em>Retrieval of attachment upload events (mailbox.log) (2/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Similarly to the reception of malicious attachments, you can search in the logs for:</p>
<ul style="text-align: justify;">
<li>the <strong>upload of attachments with suspicious extensions</strong> (e.g., .htm, .html, .exe, .js, .arj, .iso, .bat, .ps1, or Office/PDF documents containing macros);</li>
<li><strong>files already observed earlier</strong> during the initial phases of the incident (for example, a document downloaded by patient zero);</li>
<li><strong>correlating upload activities</strong> with malicious source IP addresses or accounts identified as compromised.</li>
</ul>
<p style="text-align: justify;">This list is <strong>not exhaustive</strong>; it may be relevant to search for <strong>any type of file</strong> that seems <strong>pertinent</strong> <strong>to the context of your investigation</strong>.</p>
<p> </p>
<h4>Removal of traces</h4>
<p style="text-align: justify;">Now that you have a clear picture of what the attacker did with the compromised accounts, you are disappointed because you <strong>cannot locate the emails in question</strong>. You suspect that the attacker <strong>erased its traces</strong>. But how can you verify this?</p>
<p style="text-align: justify;">Indeed, after sending malicious emails, an experienced attacker may try to <strong>hide its tracks</strong> from the legitimate mailbox owner by <strong>deleting sent emails</strong> or returned messages.</p>
<p style="text-align: justify;">Fortunately, the following commands will allow you to <strong>identify email deletions </strong>performed in Zimbra:</p>
<figure id="attachment_28743" aria-describedby="caption-attachment-28743" style="width: 1373px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28743" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_.png" alt="Retrieval of deleted items from the trash (mailbox.log)" width="1373" height="361" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_.png 1373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-437x115.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-768x202.png 768w" sizes="auto, (max-width: 1373px) 100vw, 1373px" /><figcaption id="caption-attachment-28743" class="wp-caption-text"><em>Retrieval of deleted items from the trash (mailbox.log)</em></figcaption></figure>
<figure id="attachment_28746" aria-describedby="caption-attachment-28746" style="width: 1375px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28746" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_.png" alt="Retrieval of permanently deleted files (mail.log)" width="1375" height="364" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_.png 1375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-437x116.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-768x203.png 768w" sizes="auto, (max-width: 1375px) 100vw, 1375px" /><figcaption id="caption-attachment-28746" class="wp-caption-text"><em>Retrieval of permanently deleted files (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In legitimate use, it is not uncommon for a user to <strong>delete multiple emails</strong> (e.g., inbox cleanup, managing newsletters). However, the situation becomes <strong>suspicious</strong> when deletions occur:</p>
<ul style="text-align: justify;">
<li><strong>Immediately</strong> after a <strong>mass email sending</strong></li>
<li>Targeting specifically the <strong>most recently sent messages</strong></li>
</ul>
<p style="text-align: justify;">During your investigation, keep in mind that an attacker may also attempt to delete:</p>
<ul style="text-align: justify;">
<li><strong>Read receipts generated by their emails</strong></li>
<li><strong>Automatic replies</strong> (out-of-office messages, NDRs) that could alert the victim</li>
</ul>
<p style="text-align: justify;">It is therefore important <strong>not to overlook deletions</strong> and to <strong>correlate them with other indicators</strong> (suspicious authentications, mass email sending, quota exceedances, connections from malicious IPs) to assess the <strong>legitimacy</strong> <strong>of these actions</strong>.</p>
<p> </p>
<h4>Data exfiltration</h4>
<p style="text-align: justify;"><strong>One question still troubles you</strong>… Among the compromised accounts, some belonged to users who handled sensitive data for the company. You therefore want to determine whether the attacker attempted to <strong>exfiltrate any email</strong> they had access to.</p>
<p style="text-align: justify;">Unfortunately for you, <strong>Zimbra does not log the direct download of emails</strong>. After all, retrieving messages via IMAP or SMTP is essentially a &#8220;<em>download</em>&#8221; from the server to the mail client. It is therefore difficult to distinguish a <strong>normal transfer</strong> from a <strong>malicious download</strong>. And in the Nginx logs (which expose the webmail), the same issue arises: it is impossible to precisely identify whether an email was downloaded.</p>
<p style="text-align: justify;">As a small consolation, Zimbra does log certain internal operations, particularly <strong>copy actions</strong> performed within the mailbox. An attacker could, for example, create a folder to store sensitive emails before extraction.</p>
<p style="text-align: justify;">The following command allows you to identify a <strong>massive copy of emails</strong> <strong>into a folder</strong> (here named &#8220;<em>Exfiltration</em>&#8220;) from the web client:</p>
<figure id="attachment_28748" aria-describedby="caption-attachment-28748" style="width: 1254px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28748" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2.png" alt="Retrieval of mass email copy events (mailbox.log) (1/2)" width="1254" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2.png 1254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-768x481.png 768w" sizes="auto, (max-width: 1254px) 100vw, 1254px" /><figcaption id="caption-attachment-28748" class="wp-caption-text"><em>Retrieval of mass email copy events (mailbox.log) (1/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">The following command allows you to identify a copy of a large number of emails in a folder from an IMAP thick client:</p>
<figure id="attachment_28750" aria-describedby="caption-attachment-28750" style="width: 1129px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28750" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2.png" alt="Retrieval of mass email copy events (mailbox.log) (2/2)" width="1129" height="708" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-768x482.png 768w" sizes="auto, (max-width: 1129px) 100vw, 1129px" /><figcaption id="caption-attachment-28750" class="wp-caption-text"><em>Retrieval of mass email copy events (mailbox.log) (2/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Although there are legitimate cases (e.g., manual backup by the user), this type of activity should <strong>raise attention</strong>, especially when correlated with:</p>
<ul style="text-align: justify;">
<li>Logins from unusual IP addresses</li>
<li>Suspicious authentications</li>
<li>Mass email sending</li>
</ul>
<p style="text-align: justify;">However, as you can see, it is very difficult to <strong>confirm a data exfiltration</strong>. Therefore, it should be assumed that if a <strong>mailbox is compromised</strong>, the attacker potentially had the ability to <strong>download all emails</strong> <strong>of the affected user</strong>.</p>
<p> </p>
<h3>Detection of antivirus and antispam solutions</h3>
<p style="text-align: justify;">We haven’t really covered this until now, but it’s important to know that Zimbra natively integrates <strong>Amavis</strong>, a &#8220;<em>central</em>&#8221; component that <strong>orchestrates various security engines</strong>. These engines help identify suspicious files, phishing campaigns, and mass spam sending. It is therefore valuable to leverage these detection mechanisms when analyzing an attacker’s activities.</p>
<p style="text-align: justify;">During your investigations, examining the messages generated by Amavis can help highlight:</p>
<ul>
<li style="text-align: justify;"><strong>Messages blocked</strong> before reaching the user’s mailbox (e.g., spoofing attempts)</li>
<li style="text-align: justify;"><strong>Malicious attachments</strong> detected and placed in quarantine</li>
<li style="text-align: justify;"><strong>Violations of certain security policies</strong> defined on the platform</li>
</ul>
<p> </p>
<h4>Amavis</h4>
<p style="text-align: justify;">It is possible to retrieve certain events generated by <strong>Amavis</strong> with the following commands:</p>
<figure id="attachment_28754" aria-describedby="caption-attachment-28754" style="width: 1124px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28754" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_.png" alt="Retrieval of amavis events (mail.log)" width="1124" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_.png 1124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-437x72.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-768x126.png 768w" sizes="auto, (max-width: 1124px) 100vw, 1124px" /><figcaption id="caption-attachment-28754" class="wp-caption-text"><em>Retrieval of amavis events (mail.log)</em></figcaption></figure>
<figure id="attachment_28757" aria-describedby="caption-attachment-28757" style="width: 1127px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28757" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_.png" alt="Retrieval of amavis events (mailbox.log)" width="1127" height="272" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-768x185.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /><figcaption id="caption-attachment-28757" class="wp-caption-text"><em>Retrieval of amavis events (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Since Amavis generates a <strong>large number of events</strong>, it may be wise to focus your investigation on detections related to <strong>spam</strong> and <strong>phishing</strong>. Note that the identification of phishing messages has already been discussed in a previous section of this article (&#8220;<em>Account Compromise via Phishing Attack</em>&#8220;)</p>
<p> </p>
<h4>Incoming spam</h4>
<p style="text-align: justify;">It may be useful to identify messages that have triggered incoming <strong>spam detections</strong>. When a message is classified as spam, Zimbra generates logs indicating the <strong>reason for this categorization</strong>.</p>
<p style="text-align: justify;">These events can contain <strong>several useful pieces of information</strong>:</p>
<ul style="text-align: justify;">
<li>The affected account</li>
<li>The unique identifier of the message in the mailbox</li>
<li>The originating IP address of the email</li>
<li>Additionally, in the case of a SpamReport:
<ul>
<li>The result of the analysis (isSpam field)</li>
<li>The action taken (e.g., moving the message from the Inbox to Junk)</li>
<li>Sometimes the recipient of the report used for training or reporting purposes (e.g., a dedicated address such as spam@wavestone.corp</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">The following command can help you <strong>identify events related to the processing of incoming spam:</strong></p>
<figure id="attachment_28759" aria-describedby="caption-attachment-28759" style="width: 1124px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28759" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_.png" alt="Retrieval of events related to incoming spam (zimbra.log)" width="1124" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_.png 1124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-437x177.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-768x312.png 768w" sizes="auto, (max-width: 1124px) 100vw, 1124px" /><figcaption id="caption-attachment-28759" class="wp-caption-text"><em>Retrieval of events related to incoming spam (zimbra.log)</em></figcaption></figure>
<figure id="attachment_28761" aria-describedby="caption-attachment-28761" style="width: 1127px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28761" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_.png" alt="Retrieval of events related to incoming spam (mailbox.log)" width="1127" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-437x60.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-768x105.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /><figcaption id="caption-attachment-28761" class="wp-caption-text"><em>Retrieval of events related to incoming spam (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Since spam detections generate a <strong>large number of false positives</strong>, it may be useful to <strong>narrow the scope of your investigation</strong> as much as possible (for example, by focusing on a specific time period or a specific set of users).</p>
<p> </p>
<h4>Outgoing spam</h4>
<p style="text-align: justify;">The threat does not always come from outside. Some malicious emails <strong>sent from compromised internal accounts</strong> to external recipients can leave very interesting traces in Zimbra’s logs. Indeed, if the message sent from the compromised account is <strong>blocked by the recipient mail server’s antispam solution</strong>, that server will send an error notification back to the Zimbra server to report the rejection.</p>
<p style="text-align: justify;">Analyzing these <strong>non-delivery reports (NDRs)</strong> can therefore raise a red flag:<br />it may reveal that a user is compromised… or that an account has been used in an <strong>attempt to send malicious emails</strong>.</p>
<p style="text-align: justify;">It is possible to extract these rejected messages using the following command:</p>
<figure id="attachment_28763" aria-describedby="caption-attachment-28763" style="width: 1130px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28763" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam.png" alt="Retrieval of events related to outgoing spam" width="1130" height="188" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam.png 1130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-437x73.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-768x128.png 768w" sizes="auto, (max-width: 1130px) 100vw, 1130px" /><figcaption id="caption-attachment-28763" class="wp-caption-text"><em>Retrieval of events related to outgoing spam</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Outgoing spam is generally rare. Analyzing it only becomes truly useful in cases where the attacker attempts to <strong>lateralize</strong> to <strong>external email accounts</strong>.</p>
<p> </p>
<h2>Remediation measures</h2>
<p style="text-align: justify;"><strong>You have conducted your investigation at full speed</strong>: compromised users identified, malicious IP addresses cataloged, suspicious activities analyzed… in short, you have traced the attack with surgical precision. It is now time to move to the next step: <strong>remediation</strong>.</p>
<p style="text-align: justify;">The primary goal of remediation is to <strong>remove the attacker’s access</strong> to the infrastructure, <strong>implement detection mechanisms</strong> capable of preventing further compromise attempts, and <strong>strengthen user awareness</strong> to limit the impact of <strong>ongoing</strong> and <strong>future</strong> <strong>phishing</strong> <strong>campaigns</strong>.</p>
<p style="text-align: justify;">By <strong>collecting various indicators</strong> related to the phishing campaign (compromised or suspected accounts, email addresses, malicious IPs and domains, etc.), it is recommended to implement a series of <strong>corrective</strong> and <strong>preventive</strong> <strong>actions</strong> (non-exhaustive):</p>
<ul style="text-align: justify;">
<li><strong>Reset passwords for suspected accounts</strong>: For any user who has been compromised or is suspected of being compromised, a password reset is required.</li>
<li><strong>Block malicious domains, IP addresses, and email addresses</strong>: Infrastructure elements used by the attacker (domains, IPs, senders) should be blocked using available network solutions (proxy, firewall, mail filters) as soon as they are detected. This will limit the risk of further propagation.</li>
<li><strong>Perform antivirus/EDR scans on compromised user workstations</strong>: Workstations of compromised users should undergo antivirus or EDR analysis to:
<ul>
<li>Detect and remove any potential malicious files</li>
<li>Ensure that phishing-related files are no longer present on the workstation</li>
</ul>
</li>
<li><strong>Strengthen user awareness</strong>: Communication about ongoing phishing campaigns should be sent to users to prevent further compromise. Regular phishing awareness campaigns are strongly recommended, particularly for users who have already been compromised.</li>
<li><strong>Implement multi-factor authentication (MFA) for Zimbra mail access</strong>: Deploying a second authentication factor is highly recommended to secure mailbox access. While MFA can be perceived as inconvenient, using a Single Sign-On (SSO) with unified MFA can reduce friction while strengthening overall authentication security.</li>
<li><strong>Deploy a specialized phishing detection and filtering solution</strong>: It is recommended to install a specialized solution in detecting malicious activity in email environments. The solution should be able to identify:
<ul>
<li>Logins from unusual IP addresses</li>
<li>Brute-force attempts on user accounts</li>
<li>Mass email sending to numerous recipients</li>
<li>Use of suspicious attachments or links to untrusted domains</li>
<li>Active phishing campaigns (e.g., identified by a CTI service)</li>
</ul>
</li>
<li><strong>Ensure Zimbra log retention</strong>: It is important to secure the collection and retention of logs. It is recommended to centralize logs from the entire Zimbra infrastructure on a server external to that infrastructure. This ensures that even in the event of compromise, modification, or encryption of Zimbra servers, logs remain intact and accessible, allowing reliable forensic investigations.</li>
</ul>
<p style="text-align: justify;">Although non-exhaustive, these remediation measures will help <strong>restore confidence</strong> in your Zimbra infrastructure and user accounts. <strong>Continuous monitoring</strong> and <strong>improvement</strong> <strong>of</strong> <strong>the</strong> <strong>security</strong> <strong>posture</strong> will, however, be necessary to adapt to <strong>future</strong> <strong>threats</strong>.</p>
<h1 style="text-align: justify;"> </h1>
<p style="text-align: justify;">At the end of this little investigation, one thing is certain: while the attacker can choose the easiest path, the forensic analyst doesn’t have that luxury. Between <strong>scattered</strong> (or sometimes <strong>missing</strong>) <strong>logs</strong>, <strong>conflicting</strong> <strong>user</strong> <strong>testimonials</strong>, and <strong>limited</strong> <strong>visibility</strong> into certain Zimbra events, conducting an investigation can sometimes feel <strong>like solving a Rubik’s Cube</strong>… <strong>in the dark</strong>… <strong>with mittens on</strong>.</p>
<p style="text-align: justify;">But with a <strong>solid methodology</strong> and a <strong>few good habits</strong>, Zimbra can reveal far more information than it might seem at first glance. Its logs are a <strong>real goldmine</strong>, provided you <strong>don’t get lost in them</strong>.</p>
<p style="text-align: justify;">Ultimately, this article does not aim to turn every reader into a J<strong>edi master of Zimbra forensics</strong>… but if it can save you two days of trying to <strong>decode Zimbra logs</strong> or <strong>hunt down the useful information</strong>, then the goal has been achieved!</p>
<p style="text-align: justify;">And as is often said, in cybersecurity as elsewhere, <strong>prevention is better than cure</strong>. So harden your Zimbra infrastructure, back up your logs, raise user awareness… and above all, don&#8217;t be short on coffee supplies!</p>
<p> </p>
<h1>Sources</h1>
<ul>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Log_Files">https://wiki.zimbra.com/wiki/Log_Files</a></span></li>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview">https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview</a></span></li>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes">https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes</a></span></li>
</ul>
<p> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/#respond</comments>
		
		<dc:creator><![CDATA[Evenson Jeunesse]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 09:07:27 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[Compromission]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[SPF]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Zimbra]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28540</guid>

					<description><![CDATA[<p>The simplest attacks are often the most effective. In most companies, webmail access portals are exposed on the internet and do not always benefit from sufficient access-control mechanisms. In addition, some messaging services offer extended features that go beyond simple...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The <strong>simplest</strong> attacks are often the <strong>most effective</strong>.</p>
<p style="text-align: justify;">In most companies, <strong>webmail access portals</strong> are <strong>exposed on the internet</strong> and do not always benefit from <strong>sufficient access-control mechanisms</strong>. In addition, some messaging services offer extended features that go beyond simple email consultation, such as <strong>file sharing</strong> or access to <strong>collaborative applications</strong>.</p>
<p style="text-align: justify;"><strong>Poorly secured messaging services</strong> therefore represent <strong>prime targets for attackers</strong>. Compromising a mailbox can then be used to launch phishing campaigns, <strong>access sensitive data</strong>, carry out <strong>fraud attempts</strong>, or even gain <strong>access to other services</strong>.</p>
<p style="text-align: justify;">At <strong>CERT-W</strong>, we regularly deal with this type of compromise. In particular, several of our investigations in 2025 involved the <strong>compromise of Zimbra email accounts</strong>, a solution used by many public and private organizations. Faced with these incidents, we noticed a clear <strong>lack of forensic documentation</strong> specific to Zimbra infrastructures.</p>
<p style="text-align: justify;">This article is therefore our modest contribution to filling this gap. We share a <strong>pragmatic</strong> approach and a <strong>few tips</strong> to help you save time when analyzing this type of environment, as well as some remediation measures.</p>
<p> </p>
<h2>The Zimbra Infrastructure</h2>
<p style="text-align: justify;">If you’re not familiar with Zimbra infrastructures, don’t worry: <strong>this section is for you</strong>! For the more experienced readers, feel free to jump straight to the investigation section (<em>we won’t hold it against you</em>).</p>
<h3>The architecture</h3>
<p style="text-align: justify;">Zimbra isn’t just &#8220;<em>another mail server</em>&#8220;. It’s a complete <strong>open-source collaborative suite</strong> that brings together several useful components<strong>:</strong></p>
<ul style="text-align: justify;">
<li><strong>A mail server:</strong> the core of the system.</li>
<li><strong>A calendar, contacts, and task manager:</strong> so you never forget that 9 AM meeting.</li>
<li><strong>A web client:</strong> accessible from any browser.</li>
<li><strong>Additional services:</strong> antispam, antivirus, mobile synchronization, and more.</li>
</ul>
<p style="text-align: justify;">But like any infrastructure used by hundreds (or even thousands) of users simultaneously, sizing and performance quickly become important topics. That’s why Zimbra can be deployed in two different ways:</p>
<ul style="text-align: justify;">
<li><strong>Monolithic mode:</strong> everything on a single server (simple and effective… up to a point).</li>
<li><strong>Distributed mode:</strong> multiple servers, each with a specific role, to better handle load, availability, and maintenance.</li>
</ul>
<p style="text-align: justify;">In simplified form, a distributed Zimbra infrastructure looks like this<strong>:</strong></p>



<figure id="attachment_28574" aria-describedby="caption-attachment-28574" style="width: 1196px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28574" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN.png" alt="Architecture of a Distributed Zimbra Infrastructure" width="1196" height="669" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN.png 1196w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-341x191.png 341w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-768x430.png 768w" sizes="auto, (max-width: 1196px) 100vw, 1196px" /><figcaption id="caption-attachment-28574" class="wp-caption-text"><em>Architecture of a Distributed Zimbra Infrastructure</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Although the architecture may vary, the following components are usually present:</p>
<ul style="text-align: justify;">
<li><strong>Proxy Server:</strong> the entry point for Web, IMAP/POP, and ActiveSync clients. Logs generated at this level provide visibility into user connections (IP addresses, user agents, timestamps, etc.).</li>
<li><strong>Web Client Server (Mailboxd UI):</strong> hosts the Webmail interface used by users to access their mailbox through a browser.</li>
<li><strong>Mailbox Server (Mailboxd):</strong> hosts user mailboxes and manages messages, folders, and calendars. This component generates the richest logs (e.g., <em>mailbox.log</em>, <em>audit.log</em>, <em>sync.log</em>).</li>
<li><strong>MTA Server (Message Transfer Agent):</strong> receives emails via SMTP and delivers them to the appropriate Zimbra mailbox server using the LMTP (Local Mail Transfer Protocol).</li>
</ul>
<p style="text-align: justify;">The Zimbra MTA relies on several complementary services:</p>
<ul style="text-align: justify;">
<li><strong>Postfix MTA:</strong> handles message routing, relaying, and filtering (including attachments).</li>
<li><strong>ClamAV:</strong> antivirus engine responsible for scanning messages and attachments.</li>
<li><strong>SpamAssassin and DSPAM:</strong> spam filters that use various mechanisms to identify unwanted emails.</li>
<li><strong>Amavis:</strong> the orchestrator that runs the configured antivirus and antispam engines, then applies processing policies to incoming messages.</li>
</ul>
<p style="text-align: justify;">The <strong>MTA server</strong> plays a key role in the Zimbra infrastructure. This is where <strong>most of the security checks</strong> applied to <strong>incoming emails</strong> are performed. The diagram below illustrates the main stages of this analysis workflow:</p>
<figure id="attachment_28578" aria-describedby="caption-attachment-28578" style="width: 1448px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28578" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN.png" alt="Zimbra incoming email analysis process" width="1448" height="596" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN.png 1448w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-437x180.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-768x316.png 768w" sizes="auto, (max-width: 1448px) 100vw, 1448px" /><figcaption id="caption-attachment-28578" class="wp-caption-text"><em>Zimbra incoming email analysis process</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In the process of receiving an incoming email, the message is first handled by <strong>Postfix</strong>, which then forwards it to <strong>Amavis</strong> for analysis. <strong>Amavis</strong> invokes the <strong>various configured analysis engines</strong> and submits the email to each of them to collect their results. Based on the defined policies, Amavis returns a verdict to Postfix: deliver the message, block it, or move it to a specific folder.</p>
<p> </p>
<h3>Zimbra logs</h3>
<p style="text-align: justify;">Now that you’re practically a Zimbra architecture expert (or almost <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" />), you’ve probably noticed that <strong>many services</strong> are required to handle users’ email <strong>sending</strong> and <strong>receiving</strong>. The good news is that <strong>each of these services generates its own logs</strong>, providing significant <strong>visibility</strong> into the activity of the mail infrastructure. And for us forensic analysts, that’s excellent news: <strong>we love logs</strong>!</p>
<p style="text-align: justify;">Studying the logs generated by Zimbra allows us to <strong>reconstruct the timeline of a compromise</strong>, identify compromised mailboxes, spot malicious attachments, and even detect potential internal relays.</p>
<p style="text-align: justify;">This <strong>wealth of information</strong> is made possible thanks to logs, which are mainly located in:</p>
<ul style="text-align: justify;">
<li><strong>/opt/zimbra/log/mailbox.log:</strong> main log of user activities (authentications, sending/receiving emails, managing mails, folders, contacts, calendars, etc.).</li>
<li><strong>/opt/zimbra/log/access_log:</strong> Webmail access log (IP addresses, user agents, visited URLs).</li>
<li><strong>/opt/zimbra/log/audit.log:</strong> authentication traces (successes, failures, mechanisms used).</li>
<li><strong>/opt/zimbra/log/sync.log:</strong> mobile synchronization traces (ActiveSync/EAS).</li>
<li><strong>/opt/zimbra/log/convertd.log:</strong> file conversion traces (Webmail previews, indexing).</li>
<li><strong>/opt/zimbra/log/clamd.log | /opt/zimbra/log/freshclam.log:</strong> ClamAV antivirus activity.</li>
<li><strong>/opt/zimbra/log/spamtrain.log:</strong> traces of user-initiated antispam training.</li>
<li><strong>/opt/zimbra/log/cbpolicyd.log:</strong> Postfix policy enforcement (quotas, anti-relay, restrictions).</li>
<li><strong>/var/log/mail.log:</strong> system Postfix logs (SMTP, LMTP, Amavis).</li>
<li><strong>/var/log/nginx.access.log | /var/log/nginx.log:</strong> Nginx web server logs (useful for contextualizing web sessions).</li>
</ul>
<p style="text-align: justify;">Unfortunately, in a <strong>distributed Zimbra architecture</strong>, logs are <strong>not centralized</strong>. In other words, to get a complete picture of an incident, an analyst often needs to <strong>collect logs from each node</strong>: proxy, mailstore, MTA, or any other peripheral server. Yes, it requires a bit of gymnastics (<em>and patience</em>).</p>
<p style="text-align: justify;">As we mentioned, the wealth of Zimbra logs is a real <strong>goldmine</strong> for investigations… but, like any mine, you need to <strong>dig methodically</strong>, or you’ll quickly find yourself buried under tons of log lines. Some effort in <strong>sorting</strong> and <strong>correlating</strong> data is therefore necessary to <strong>extract relevant information</strong>.</p>
<p style="text-align: justify;">And despite their undeniable usefulness, Zimbra logs have some <strong>notable limitations</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>No access to the full content of emails</strong> or their attachments.</li>
<li style="text-align: justify;"><strong>Email subjects are rarely available</strong>, except when intercepted by antispam or antivirus modules.</li>
<li style="text-align: justify;"><strong>No native visibility into the creation of forwarding rules</strong>.</li>
<li style="text-align: justify;"><strong>Rapid rotation of verbose logs</strong> (like <em>log</em>), which limits the analysis time window if logs are not centralized.</li>
</ul>
<p> </p>
<h2>Investigating in a Zimbra Environment</h2>
<p style="text-align: justify;">Now that Zimbra’s infrastructure and logs <strong>hold no secrets for you</strong>, it’s time to get <strong>practical</strong>.</p>
<p style="text-align: justify;">Imagine you’re a forensic analyst, arriving early one morning, when suddenly: <strong>the phone rings.</strong> You’re being called because several users are reporting that emails, <strong>they didn’t send</strong> are appearing in their “Sent” folder.</p>
<p style="text-align: justify;"><strong>Panic ensues</strong>! Users are afraid to log into their mailboxes, and some administrators start wondering whether the <strong>Zimbra infrastructure itself</strong> might be <strong>compromised</strong>.</p>
<p style="text-align: justify;">Since you know Zimbra inside out, the team naturally turns to you to <strong>investigate this incident</strong>!</p>
<p style="text-align: justify;">As a forensic analyst, many questions come to mind:</p>
<ul style="text-align: justify;">
<li><em>Have the accounts really been compromised? If so, how and since when?</em></li>
<li><em>How many users are affected?</em></li>
<li><em>What is the attacker’s objective, and what malicious actions have been carried out from these accounts?</em></li>
<li><em>Have the mail server or other Zimbra components been compromised?</em></li>
<li><em>And, most importantly: do I have time for a coffee </em><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2615.png" alt="☕" class="wp-smiley" style="height: 1em; max-height: 1em;" /><em> before the information hunt begins?</em></li>
</ul>
<p style="text-align: justify;">To help you in your investigation, we’ll look at how to answer these questions through Zimbra log analysis. But first, here are some tips to guide your investigation.</p>
<p style="text-align: justify;">During incident response, it’s easy to feel <strong>overwhelmed</strong> by the <strong>amount of logs</strong> <strong>and</strong> <strong>events</strong> <strong>to analyze</strong>. Keeping a clear line of reasoning is essential. A few simple practices can help maintain focus:</p>
<ul style="text-align: justify;">
<li><strong>Confirm:</strong> Verify the information that triggered the incident. Before diving deeper, ensure the initial alert is accurate. This undeniable baseline will serve as the foundation for the entire investigation.</li>
<li><strong>Correlate:</strong> Cross-check suspicious IP addresses and domains with other sources (proxy, VPN, EDR, online antivirus databases). This provides additional context related to the identified indicator.</li>
<li><strong>Pivot:</strong> Use the collected information to expand your analysis. An attacker might reuse the same IP address or user-agent across multiple accounts. Conversely, a compromised account might be accessed from different IP addresses or user-agents. Pivoting can reveal other indicators that help identify the attacker.</li>
<li><strong>Compare patterns:</strong> Even without direct access to email content or attachments, certain elements can reveal similarities (file size, identical filenames, repeated sequences of actions after account compromise). This behavioral analysis approach can help identify multiple users compromised by the same attacker. Such hypotheses should be formulated and handled cautiously, but they can be valuable for confirming intuition.</li>
<li><strong>Ensure log preservation:</strong> This may seem obvious, but as soon as an incident is detected, securing the logs is critical. Collect logs immediately from the entire Zimbra infrastructure and extend their retention period to prevent automatic deletion. Because let’s be honest: logs disappearing just as the forensic team arrives is a way too common scenario… one you definitely want to avoid.</li>
</ul>
<p style="text-align: justify;">While these tips <strong>aren’t exhaustive</strong>, they provide a solid foundation for conducting an analysis that is both <strong>fast</strong> and <strong>efficient</strong>.</p>
<p> </p>
<h3>Compromise and initial access</h3>
<h4><em>The spoofing trap</em></h4>
<p style="text-align: justify;"><strong>You are not fooled</strong>! You know that sometimes one might believe the attacker is already inside the system, when in reality, they are still outside (fake it until you make it). Especially when multiple users start reporting concerning incidents, such as:</p>
<ul style="text-align: justify;">
<li>&#8220;<em>I received an email from so-and-so, yet they claim they never sent it.</em>&#8220;</li>
<li>&#8220;<em>I received an email from my own address, which makes no sense!</em>&#8220;</li>
</ul>
<p style="text-align: justify;">But your experience pushes you to verify that the current confusion is not simply the result of… a <strong>spoofing attack</strong>.</p>
<p style="text-align: justify;">Indeed, <strong>spoofing</strong> is a relatively simple identity impersonation attack used by malicious actors to <strong>falsify email header information</strong> (e.g. sender address) in order to <strong>deceive a victim</strong>. Spoofing allows an email to be sent while pretending to be from a <strong>legitimate sender</strong> (for example, an internal user of the company or the recipient themselves), when in reality the email comes from an infrastructure that has <strong>no authorization</strong> <strong>to use that email address</strong>.</p>
<p style="text-align: justify;">The goal is to <strong>gain the recipient’s trust</strong> to prompt them to <strong>take an action</strong> (click a link, open an attachment, provide credentials, etc.) or bypass<strong> filtering mechanisms</strong>.</p>
<p style="text-align: justify;">Mechanisms such as <strong>SPF</strong>, <strong>DKIM</strong>, and <strong>DMARC</strong> were designed to reduce the risks associated with spoofing by allowing verification of the sender domain and server authenticity.</p>
<p style="text-align: justify;">More specifically, the <strong>Sender Policy Framework (SPF)</strong> is an email security mechanism that allows verification that the sending server of a message is indeed authorized to send emails on behalf of the domain indicated in the sender’s address. The steps of an SPF check are illustrated below:</p>
<figure id="attachment_28576" aria-describedby="caption-attachment-28576" style="width: 1143px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28576" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN.png" alt="Steps involved in an SPF check" width="1143" height="478" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN.png 1143w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-768x321.png 768w" sizes="auto, (max-width: 1143px) 100vw, 1143px" /><figcaption id="caption-attachment-28576" class="wp-caption-text"><em>Steps involved in an SPF check</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Concretely, the domain owner publishes in the DNS records a li<strong>st of IP addresses authorized to send emails</strong> on behalf of their domain. When a mail server receives an email, it can <strong>compare the sender’s IP address</strong> to this list and determine whether the message is legitimate or potentially fraudulent.</p>
<p style="text-align: justify;">An <strong>SPF check failure</strong> indicates that the email was sent from a <strong>server not authorized</strong> by the sender’s domain. This serves as an indicator for identifying <strong>potential spoofing attempts</strong>.</p>
<p style="text-align: justify;">In Zimbra logs, <strong>SPF check failures</strong> can be identified using the following command:</p>
<figure id="attachment_28544" aria-describedby="caption-attachment-28544" style="width: 1682px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28544" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_.png" alt="Retrieval of messages that failed SPF check (zimbra.log)" width="1682" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_.png 1682w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-437x87.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-71x14.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-768x152.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-1536x304.png 1536w" sizes="auto, (max-width: 1682px) 100vw, 1682px" /><figcaption id="caption-attachment-28544" class="wp-caption-text"><em>Retrieval of messages that failed SPF check (zimbra.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In above example, we can see that the message sent from <strong>attacker@microsoft.com</strong> to <strong>user25@wavestone.corp</strong> <strong>does not pass SPF validation</strong> (SPF_FAIL). The &#8220;<em>Yes</em>&#8221; field indicates that it is classified as spam. Since its score (9.172) exceeds the required threshold (4), this message will therefore <strong>not be delivered</strong> to its recipient.</p>
<p style="text-align: justify;">However, you should not place blind trust in the antispam engine! Some emails that <strong>fail SPF checks may still be delivered</strong>. To extract only these messages, you can use the following command:</p>
<figure id="attachment_28546" aria-describedby="caption-attachment-28546" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28546" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_.png" alt="Retrieval of messages that failed SPF check and were delivered (zimbra.log)" width="1692" height="360" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-437x93.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-768x163.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-1536x327.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28546" class="wp-caption-text"><em>Retrieval of messages that failed SPF check and were delivered (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the example below, the message <strong>fails the SPF check</strong>, but its score is negative (-2.06) and below the spam threshold (4). It is therefore considered <strong>legitimate</strong> and <strong>delivered to the recipient despite the SPF failure.</strong></p>
<p style="text-align: justify;">As you can see, Zimbra logs make it possible to quickly <strong>identify senders responsible for spoofing attacks</strong>. Detecting a <strong>spoofing case</strong> <strong>early</strong> in the investigation helps to quickly reduce concerns and restore a certain level of <strong>trust in the Zimbra infrastructure</strong>.</p>
<p style="text-align: justify;"> </p>
<h4><em>Analysis of the attacker&#8217;s initial access</em></h4>
<p style="text-align: justify;">Once you have confirmed that you are <strong>not dealing with a spoofing attack</strong>, it means the attacker has, in one way or another, succeeded in compromising an account or a component of the infrastructure. The first step of your investigation will be to <strong>identify the attacker’s initial point of entry</strong>. This means finding the answers to the questions “Where?”, “When?”, and “How?”. But when it comes to compromising a mailbox, several approaches are possible…<br /><br /></p>
<p><span style="text-decoration: underline;"><em><strong>Account compromise through password brute‑forcing</strong></em></span></p>
<p style="text-align: justify;">One path you can explore is the possibility that the attacker attempted to compromise certain accounts through a <strong>brute‑force attack</strong>.</p>
<p style="text-align: justify;">To do this, simply examine authentication failures in the Zimbra logs<strong>:</strong></p>
<figure id="attachment_28548" aria-describedby="caption-attachment-28548" style="width: 1693px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_.png" alt="Retrieval of connection failures (mail.log)" width="1693" height="229" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_.png 1693w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-768x104.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-1536x208.png 1536w" sizes="auto, (max-width: 1693px) 100vw, 1693px" /><figcaption id="caption-attachment-28548" class="wp-caption-text"><em>Retrieval of connection failures (mail.log)</em></figcaption></figure>
<figure id="attachment_28550" aria-describedby="caption-attachment-28550" style="width: 1690px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_.png" alt="Retrieval of connection failures (audit.log)" width="1690" height="384" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_.png 1690w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-437x99.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-768x175.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-1536x349.png 1536w" sizes="auto, (max-width: 1690px) 100vw, 1690px" /><figcaption id="caption-attachment-28550" class="wp-caption-text"><em>Retrieval of connection failures (audit.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the events above, we can see <strong>authentication attempts</strong> coming from the IP address <strong>100.100.4.111 </strong>that failed for the account <strong>user25@wavestone.corp</strong>.</p>
<p style="text-align: justify;">A <strong>large number of unsuccessful login</strong> <strong>attempts</strong> over a <strong>short period</strong>, from the <strong>same IP address</strong> or targeting the <strong>same account</strong>, is indicative of a <strong>brute‑force attempt</strong>.</p>
<p style="text-align: justify;">An excessive number of authentication failures can also <strong>trigger automatic</strong> <strong>account lockout</strong> by Zimbra:</p>
<figure id="attachment_28552" aria-describedby="caption-attachment-28552" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28552" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_.png" alt="Retrieval of account lockout events (mail.log)" width="1692" height="180" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-768x82.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-1536x163.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28552" class="wp-caption-text"><em>Retrieval of account lockout events (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">From a forensic perspective, the appearance of such an event in the logs may suggest that an account was <strong>potentially targeted</strong>.</p>
<p style="text-align: justify;">Once the brute‑force attempt has been identified, it is possible to check when the attacker may have used the compromised account by analyzing the <strong>successful logins</strong> associated with that user:</p>
<figure id="attachment_28554" aria-describedby="caption-attachment-28554" style="width: 1689px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_.png" alt="Retrieval of successful authentication events (audit.log)" width="1689" height="280" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_.png 1689w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-437x72.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-768x127.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-1536x255.png 1536w" sizes="auto, (max-width: 1689px) 100vw, 1689px" /><figcaption id="caption-attachment-28554" class="wp-caption-text"><em>Retrieval of successful authentication events (audit.log)</em></figcaption></figure>
<figure id="attachment_28556" aria-describedby="caption-attachment-28556" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_.png" alt="Retrieval of successful authentication events (mailbox.log)" width="1692" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-437x87.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-71x14.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-768x152.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-1536x304.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28556" class="wp-caption-text"><em>Retrieval of successful authentication events (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Additionally, if you have <strong>identified the attacker&#8217;s IP address</strong>, you can find all <strong>successful connections from that address</strong> using the following commands:</p>
<figure id="attachment_28558" aria-describedby="caption-attachment-28558" style="width: 1694px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28558" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_.png" alt="Retrieval of successful authentication events via IP (audit.log)" width="1694" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_.png 1694w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-437x13.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-768x22.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-1536x44.png 1536w" sizes="auto, (max-width: 1694px) 100vw, 1694px" /><figcaption id="caption-attachment-28558" class="wp-caption-text"><em>Retrieval of successful authentication events via IP (audit.log)</em></figcaption></figure>
<figure id="attachment_28560" aria-describedby="caption-attachment-28560" style="width: 1693px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28560" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_.png" alt="Retrieval of successful authentication events via IP (mailbox.log)" width="1693" height="48" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_.png 1693w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-437x12.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-768x22.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-1536x44.png 1536w" sizes="auto, (max-width: 1693px) 100vw, 1693px" /><figcaption id="caption-attachment-28560" class="wp-caption-text"><em>Retrieval of successful authentication events via IP (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Once malicious connections have been identified, it is necessary to <strong>analyze the account activity </strong>following these accesses in order to identify the <strong>actions performed by the attacker</strong>.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Account compromise through phishing attacks</strong></em></span></p>
<p style="text-align: justify;">If no brute‑force attempts have been identified, another common initial compromise vector is the way too familiar: <strong>phishing attack</strong>! In this case, the attack does not target the Zimbra infrastructure directly: the user first receives an email prompting them to <strong>visit a fraudulent page</strong> or <strong>open a malicious file</strong>. Only after clicking does the damage occur (such as credential or session token theft).</p>
<p style="text-align: justify;">In this scenario, you should, <strong>if possible</strong>, retrieve the malicious email from the user’s mailbox for analysis. If you can obtain it, here are the <strong>key pieces of information to collect</strong>:</p>
<ul style="text-align: justify;">
<li>Date and time of receipt</li>
<li>Subject of the email</li>
<li>Sender (From)</li>
<li>Recipients (To, Cc)</li>
<li>Reply addresses (Reply-To, Return-Path)</li>
<li>IP address of the originating sending server</li>
<li>Names of attachments (if any)</li>
<li>Results of SPF, DKIM, and DMARC checks</li>
<li>Identified phishing URLs (if present)</li>
</ul>
<p style="text-align: justify;">These elements will help reconstruct the <strong>attacker’s methodology</strong>, provide <strong>initial guidance</strong> for your investigation and define <strong>first remediation measures</strong>.</p>
<p style="text-align: justify;">Unfortunately, if you <strong>do not have direct access to the user’s mailbox</strong>, you will need to rely primarily on Zimbra logs, specifically the <strong>events generated by Amavis</strong> when analyzing <strong>incoming emails</strong>.</p>
<p style="text-align: justify;">Suppose you want to <strong>identify malicious attachments</strong> sent by an attacker to users. Zimbra logs are very useful in this case, as they allow you to track the files that were analyzed and extract information such as their name, size, type, and fingerprint (SHA1).</p>
<p style="text-align: justify;">The following command allows you to identify attachments processed by Amavis during the analysis of incoming messages:</p>
<figure id="attachment_28562" aria-describedby="caption-attachment-28562" style="width: 1694px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28562" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_.png" alt="Retrieval of attachments scanned by amavis (zimbra.log)" width="1694" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_.png 1694w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-437x80.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-768x141.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-1536x282.png 1536w" sizes="auto, (max-width: 1694px) 100vw, 1694px" /><figcaption id="caption-attachment-28562" class="wp-caption-text"><em>Retrieval of attachments scanned by amavis (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The result above shows that the file <strong>Evil.htm</strong> was analyzed by Amavis. Several useful pieces of information can be found:</p>
<ul style="text-align: justify;">
<li>Date and time: <strong>November 12 at 11:15</strong></li>
<li>SHA‑1 signature of the file: <strong>9d57b71f9f758a27ccd680f701317574174e82d8</strong></li>
<li>Size: <strong>22,111 bytes</strong></li>
<li>Content-Type: <strong>text/html</strong></li>
<li>Amavis session ID associated with this analysis: <strong>4384125-19</strong></li>
</ul>
<p style="text-align: justify;">However, on their own, these elements do not allow you to determine <strong>which users received this attachment</strong> or <strong>who the sender was</strong>. To obtain this information, a second command must be executed to retrieve all traces associated with this Amavis session:</p>
<figure id="attachment_28564" aria-describedby="caption-attachment-28564" style="width: 1317px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png" alt="Retrieval of traces generated by an amavis analysis session (zimbra.log)" width="1317" height="723" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png 1317w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-768x422.png 768w" sizes="auto, (max-width: 1317px) 100vw, 1317px" /><figcaption id="caption-attachment-28564" class="wp-caption-text"><em>Retrieval of traces generated by an amavis analysis session (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">From this information, you can now deduce that <strong>attacker@example.com</strong> sent the file <strong>Evil.htm</strong> (22,111 bytes) to <strong>user25@wavestone.corp</strong> on <strong>November 12 at 11:15</strong>, and that its SHA‑1 signature is <strong>9d57b71f9f758a27ccd680f701317574174e82d8</strong>. Not bad, right?</p>
<p style="text-align: justify;">During your investigation, you can further filter the output of these commands to identify:</p>
<ul style="text-align: justify;">
<li><strong>Attachments with suspicious extensions</strong> (e.g., *.htm, *.html, *.exe, *.js, *.arj, *.iso, *.bat, <em>.ps1,</em> or Office/PDF documents containing macros)</li>
<li><strong>Files previously observed during the early stages of the incident</strong> (for example, a file downloaded by patient zero)</li>
</ul>
<p style="text-align: justify;">During a <strong>phishing campaign</strong> involving the <strong>delivery</strong> <strong>of</strong> <strong>a</strong> <strong>malicious</strong> <strong>file</strong>, attackers often tend to distribute the <strong>same file to multiple users</strong>. It is therefore possible to rely on <strong>statistical analysis</strong> to highlight <strong>abnormal values</strong>.</p>
<p style="text-align: justify;">The following command allows you to identify <strong>identical files</strong> present in several incoming emails:</p>
<figure id="attachment_28566" aria-describedby="caption-attachment-28566" style="width: 1320px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28566" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png" alt="Retrieval of traces generated by an amavis analysis session (zimbra.log)" width="1320" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png 1320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-768x307.png 768w" sizes="auto, (max-width: 1320px) 100vw, 1320px" /><figcaption id="caption-attachment-28566" class="wp-caption-text"><em>Retrieval of traces generated by an amavis analysis session (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The command above allows you to retrieve, for <strong>each attachment</strong> in emails received by Zimbra, the <strong>number of times it has been observed</strong> in other emails, based on its <strong>name</strong> and <strong>SHA‑1 signature</strong>.</p>
<p style="text-align: justify;">In this example, the file <strong>Evil.htm</strong> appears in <strong>40 emails</strong>, which, combined with its <em>.htm</em> extension, makes it particularly suspicious. It would therefore be relevant to attempt to <strong>retrieve this file from the affected users</strong> to verify its legitimacy.</p>
<p style="text-align: justify;">If the analysis of attachments did not help you identify the culprit, there is one last avenue to explore: retrieving phishing detections from <strong>SpamAssassin</strong> (an antispam engine executed by Amavis).</p>
<p style="text-align: justify;">The following command allows you to identify messages flagged as suspected phishing by SpamAssassin:</p>
<figure id="attachment_28568" aria-describedby="caption-attachment-28568" style="width: 1318px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28568" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2.png" alt="Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (1/2)" width="1318" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2.png 1318w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-437x145.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-768x255.png 768w" sizes="auto, (max-width: 1318px) 100vw, 1318px" /><figcaption id="caption-attachment-28568" class="wp-caption-text"><em>Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (1/2)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">However, this command only provides <strong>limited information</strong>: the sender, the recipient, and the detection rules that were triggered. To obtain more details on the complete analysis, you must retrieve the <strong>Amavis session ID</strong> associated with the message (here <strong>765283-08</strong>), then execute the following command:</p>
<figure id="attachment_28570" aria-describedby="caption-attachment-28570" style="width: 1319px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2.png" alt="Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (2/2)" width="1319" height="40" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2.png 1319w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-437x13.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-768x23.png 768w" sizes="auto, (max-width: 1319px) 100vw, 1319px" /><figcaption id="caption-attachment-28570" class="wp-caption-text"><em>Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (2/2)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">This second command provides access to <strong>additional information</strong> generated during the analysis of the message by Amavis.</p>
<p style="text-align: justify;">However, <strong>SpamAssassin results should be interpreted with caution</strong>, as its detection rules can generate a significant number of false positives.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Exploiting a vulnerability on the Zimbra web server</strong></em></span></p>
<p style="text-align: justify;"><strong>Your experience as a forensic investigator has taught you</strong>: this is neither the first nor the last time that an application vulnerability allows an attacker to hijack user sessions. <strong>Zimbra is no exception</strong>, and its web server, which provides access to mailboxes, could very well be vulnerable to this type of attack.</p>
<p style="text-align: justify;">Compromise of the Zimbra web server could, in theory, allow an attacker to <strong>capture credentials of users logging in</strong>. “But how can we check if Zimbra has been subjected to web intrusion attempts?” you might ask.</p>
<p style="text-align: justify;">A first step is to <strong>inspect the proxy (nginx) logs</strong> to identify <strong>malicious</strong> or <strong>suspicious</strong> <strong>HTTP</strong> <strong>requests</strong> targeting the web interface:</p>
<figure id="attachment_28572" aria-describedby="caption-attachment-28572" style="width: 1501px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_.png" alt="Retrieval of web exploitation attempts (nginx.log/nginx.access.log)" width="1501" height="566" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_.png 1501w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-768x290.png 768w" sizes="auto, (max-width: 1501px) 100vw, 1501px" /><figcaption id="caption-attachment-28572" class="wp-caption-text"><em>Retrieval of web exploitation attempts (nginx.log/nginx.access.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Among the indicators to look for in the logs are:</p>
<ul style="text-align: justify;">
<li>Unusual <strong>POST </strong>or<strong> PUT</strong> requests or requests to unexpected endpoints</li>
<li>Injection attempts (<strong>SQLi</strong>, <strong>LFI</strong>, <strong>RCE</strong> payloads visible in URIs or parameters)</li>
<li>Repeated access to non-public resources or atypical scripts</li>
<li>Strange <strong>User-Agents</strong> or a high concentration of requests from the same IP</li>
<li>Numerous <strong>4xx/5xx errors</strong> on sensitive paths (indicative of scanning/enumeration)</li>
<li>Signs of file uploads (attempts to access <strong>/tmp</strong>, <strong>/uploads</strong>, etc.) or hits on <strong>known web shells</strong></li>
</ul>
<p style="text-align: justify;">If you observe <strong>malicious requests</strong> that succeeded (for example, with an <strong>HTTP 200</strong> code), it is recommended to <strong>conduct a more in-depth investigation</strong> on the server to determine whether the exploitation was actually successful.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Compromise of the user&#8217;s workstation</strong></em></span></p>
<p style="text-align: justify;">If none of the previous scenarios seem to match what you are observing and the initial point of entry remains <strong>unidentified</strong>, it is possible that the attacker <strong>obtained access credentials directly from the user’s workstation</strong>.</p>
<p style="text-align: justify;">This type of compromise can occur, for example:</p>
<ul style="text-align: justify;">
<li>As a result of a <strong>previous phishing campaign</strong></li>
<li>Because the user <strong>executed a malicious program</strong> on their machine (cracks, software downloaded from a dubious site, connecting an infected USB drive, etc.)</li>
</ul>
<p style="text-align: justify;">Once able to execute code on the workstation, the attacker can easily extr<strong>act credentials stored in the browser</strong>, <strong>retrieve session cookies</strong>, or even <strong>install a keylogger</strong> to capture keystrokes.</p>
<p style="text-align: justify;">Detecting this type of compromise goes beyond the scope of this article. But keep this possibility in mind: if no intrusion traces appear in Zimbra, <strong>the problem may lie elsewhere</strong> <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Yes! The investigation is far from over! This first part has allowed you to master Zimbra’s architecture, understand the different sources of evidence, and observe that through Zimbra logs it is possible to identify several compromise techniques. However, the initial access is only the starting point of our research. In a second part, we will continue the post–initial-access analysis. First, we will try to identify the malicious actions carried out by the attacker after compromising an account. Second, we will review the various remediation measures to implement. Stay tuned, a follow-up article will be published soon to delve deeper into these next steps!</p>
<p> </p>
<h2>Sources</h2>
<ul>
<li><a href="https://wiki.zimbra.com/wiki/Log_Files"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Log_Files</span></a></li>
<li><a href="https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview</span></a></li>
<li><a href="https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes</span></a></li>
</ul>
<p> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Barb’Hack : What to Remember</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/#respond</comments>
		
		<dc:creator><![CDATA[Gauthier Vidal]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 08:03:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[AsRepCatcher]]></category>
		<category><![CDATA[Barbhack]]></category>
		<category><![CDATA[Barbhack 2025]]></category>
		<category><![CDATA[binaires malveillants]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[conférence cybersécurité]]></category>
		<category><![CDATA[cybersecurité]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity conference]]></category>
		<category><![CDATA[Flipper Zero]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Malicious binaries]]></category>
		<category><![CDATA[National Police]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Purple Team]]></category>
		<category><![CDATA[r2ai]]></category>
		<category><![CDATA[réponse à incident]]></category>
		<category><![CDATA[Responder]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[WebDAV]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27461</guid>

					<description><![CDATA[<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.   Keeping Responder Relevant: The Hidden Potential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.</p>
<p> </p>
<h2>Keeping Responder Relevant: The Hidden Potential of Name Resolution Poisoning</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2"><em>Speaker: Quentin Roland</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Quentin Roland’s talk revisited a set of techniques that are often dismissed as “old-school”: poisoning local name resolution protocols like LLMNR, NBNS, or mDNS. While these attacks are usually thought of as a way to quietly capture SMB authentications, the presentation showed that Windows’ built-in behaviors can turn them into a much more serious threat. In particular, the WebDAV fallback and Kerberos relaying can be combined to turn routine network noise into a pathway for domain compromise.</p>
<div style="text-align: justify;">
<h3> </h3>
<h3>The WebDAV Fallback Trick</h3>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">In a typical Windows environment, SMB authentication is everywhere. Poisoning SMB requests with tools like <strong>Responder</strong> can capture credentials, but most of the time these are machine accounts or authentications that can’t be relayed because SMB enforces strict integrity checks. As a result, many captured authentications are effectively useless for attackers.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">The talk highlighted an often-overlooked behavior: Windows will sometimes retry failed SMB connections over HTTP using the WebDAV protocol. This happens through the WebClient service, which is installed by default on most machines. The trick lies in how Windows interprets different error codes. By default, when an SMB login fails, the server responds with a “<strong>STATUS_ACCESS_DENIED</strong>” status. Windows stops at that point. But if the server responds with a “<strong>STATUS_LOGON_FAILURE</strong>” instead, the operating system interprets this as a problem with the protocol rather than with the credentials. It retries the connection using WebDAV, effectively transforming an SMB authentication into an HTTP authentication.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="12">This fallback opens a surprising avenue for attackers. HTTP authentications <strong>do not enforce signing by default</strong>, which means they can be relayed to services like LDAP without being blocked by the protections that make SMB less useful. A poisoned SMB request that would otherwise be wasted suddenly becomes a live, relayed authentication that can be used to enumerate Active Directory, spray passwords, or even create new machine accounts.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="14">The main limitation is that the <strong>WebClient service must be running</strong>. While it is installed by default, it isn’t always active unless the user or a process has accessed a WebDAV share. Still, where it is enabled, this fallback represents a subtle but powerful way to pivot within a network.</p>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;"> </div>
<div>
<h3 id="combining-webdav-fallback-with-kerberos-relaying" class="code-line" dir="auto" style="text-align: justify;" data-line="16">Combining WebDAV Fallback with Kerberos Relaying</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="18">The second part of the talk explored how this fallback can be extended to Kerberos, which is particularly relevant in environments where NTLM has been disabled. Kerberos relaying is usually tricky because tickets are bound to specific services. However, by controlling hostname resolution through LLMNR or NBNS, an attacker can trick a client into requesting a Kerberos ticket for any service of their choosing.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">With LLMNR poisoning, the attacker is in control of the hostname resolution. By answering with a chosen service name — for example, pointing to an ADCS (Active Directory Certificate Services) instance — the victim generates a Kerberos ticket for that service and sends it straight to the attacker. Using <code>krbrelayx</code>, the attacker can then relay that ticket to ADCS and <strong>request a certificate</strong>. Once a valid certificate is obtained, it can be used to request a TGT, opening the door to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Now comes the clever part: chaining both ideas together. By combining the WebDAV fallback (responder <code>-E</code> flag) with the Kerberos relaying trick (responder <code>-N</code> flag), SMB traffic can be turned into HTTP WebDAV retries that carry Kerberos tickets. Those tickets can then be relayed directly to ADCS. The attack chain is surprisingly short:</p>
<ol class="code-line" dir="auto" style="text-align: justify;" data-line="24">
<li class="code-line" dir="auto" data-line="24">Victim tries to connect to a nonexistent SMB share.</li>
<li class="code-line" dir="auto" data-line="25">Responder poisons the request, forcing a WebDAV retry.</li>
<li class="code-line" dir="auto" data-line="26">The retry is done over HTTP with Kerberos authentication, using the attacker’s chosen service name.</li>
<li class="code-line" dir="auto" data-line="27">The Kerberos ticket is relayed to ADCS with <code>krbrelayx</code>.</li>
<li class="code-line" dir="auto" data-line="28">ADCS issues a certificate, which the attacker uses to get a TGT.</li>
</ol>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="30">The demo showed exactly this: what started as a harmless SMB lookup ended with a valid certificate and the ability to impersonate domain users.</p>
<p dir="auto" style="text-align: justify;" data-line="30"> </p>
<h3 id="takeaways" class="code-line" dir="auto" style="text-align: justify;" data-line="32">Takeaways</h3>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="34">
<li class="code-line" dir="auto" data-line="34">
<p class="code-line" dir="auto" data-line="34"><strong>Fallbacks matter</strong>: Windows’ WebClient can silently turn SMB into HTTP, bypassing protections meant to stop relaying.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>LLMNR still bites</strong>: Even when NTLM is off, Kerberos tickets can be coerced and relayed if LLMNR is active.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>Defense</strong>: disable the WebClient service, block or disable LLMNR/NBNS, and tighten ADCS protections. Otherwise, attackers can chain these primitives into devastating relays.</p>
</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="40">In conclusion, the presentation demonstrated how Windows’ built-in fallback behaviors and overlooked protocol details can transform seemingly harmless network traffic into a serious threat. SMB authentications that would otherwise be discarded can be converted into relayable HTTP requests, and Kerberos tickets can be redirected to sensitive services to obtain valid certificates. For defenders, the takeaways are straightforward: disabling LLMNR and NBNS, stopping the WebClient service unless necessary, and hardening ADCS certificate issuance policies are key measures. Left unchecked, what appears to be ordinary background traffic on the network can become a pathway to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="42"><em>Links to the articles:</em></p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="44">
<li class="code-line" dir="auto" data-line="44"><span style="color: #000080;"><a style="color: #000080;" href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying" data-href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying">Taking the relaying capabilities of multicast poisoning to the next</a></span></li>
</ul>
</div>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Hacking a Metro Ticket</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="50"><em>Speaker : Raphael Attias (rapatt)</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="52">This talk was a dive into something both fun and a bit worrying: how easy it can be to hack metro tickets with a Flipper Zero.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="54">For those not familiar, the Flipper Zero is a pocket-sized multi-tool that can interact with various radio protocols, RFID, NFC, and more. While it can’t read every NFC type, it works with a lot of common ones — including the MiFare Ultralight cards used in many metro systems, festivals, and even hospitals.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="56">The speaker started by walking through the evolution of metro tickets: first punched paper, then magnetic stripes, and now RFID/NFC. In his city, the tickets use MiFare Ultralight, which comes with between 48 and 144 bytes of memory and a 7-byte UID. Pretty small and simple compared to more modern cards.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="58">The key detail: when a ticket is validated at a metro gate, the system simply updates one byte on page 3 of the card to mark it as “used.” That means if you can read and write to that sector, you can basically reset the ticket back to “unused” and ride again. The speaker spent nine months analyzing his card, dumping the data before and after validation, and mapping which bytes controlled what. Eventually, he managed to modify the data in a way that gave him unlimited rides.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="60">It didn’t stop there. He was even able to clone the ticket onto his Flipper Zero, use it directly at metro gates, show it to inspectors, and even recharge it at official machines. All because the system trusted the data stored on the card rather than handling everything server-side.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="62">Of course, the attack has its limits. It depends heavily on the ticketing system — not all cities use MiFare Ultralight, and more advanced implementations would catch this. Also, handling things like transfers and expiration dates requires modifying additional fields, which complicates the hack. Still, in this particular case, the weak design made unlimited metro travel possible.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="64">The fix seems straightforward: keep only the UID on the card and move all ticket logic to the backend. That way, even if someone rolls back or clones their card, the server-side system knows whether it’s valid or not. As of now, though, the city in question hasn’t corrected the issue — meaning free rides are technically still on the table.</p>
<p dir="auto" style="text-align: justify;" data-line="64"> </p>
<div style="text-align: justify;">
<h2>AsRepCatcher &#8211; Make everyone in your VLAN AsRepRoastable</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="53"><em>Speaker: Yassine OUKESSOU</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="55">A new tool called <strong>AsRepCatcher</strong> has been developed by the SOC Team Leader of the <strong>ITrust</strong> team. As the author is required to perform regular internal audits, he is faced with the following problem: <strong>How can a valid domain account be compromised without credentials</strong>?</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="59">Although there are many techniques for gaining initial access, <strong>environments are becoming increasingly secure and remedies are being more and more applied</strong>:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="61">
<li class="code-line" dir="auto" data-line="61">EternalBlue / PrintNightmare / ZeroLogon: <strong>patched machines</strong></li>
<li class="code-line" dir="auto" data-line="62">LLMNR / NBT-NS / mDNS Poisoning: <strong>protocols disabled</strong></li>
<li class="code-line" dir="auto" data-line="63">AsRep Roasting: <strong>pre-authentication enabled by default on all accounts</strong></li>
<li class="code-line" dir="auto" data-line="64">Kerberoasting: <strong>SPNs placed only on service accounts and use of gMSA</strong></li>
<li class="code-line" dir="auto" data-line="65">Network shares: <strong>reading disabled with anonymous or guest accounts</strong></li>
<li class="code-line" dir="auto" data-line="66">Brute force weak passwords: <strong>strong password policy</strong></li>
<li class="code-line" dir="auto" data-line="67">Relays: <strong>signed protocols</strong></li>
<li class="code-line" dir="auto" data-line="68">Phishing: <strong>users made aware</strong></li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="70">Although the list is not exhaustive, it represents the majority of tests performed by an internal auditor.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="72">However, what the author noticed is that <strong>network access is always provided to the auditor</strong>, usually in the area reserved for standard users: <strong>the user VLAN</strong>. In this VLAN, if a user captures the traffic, he will see packets related to authentication, in particular with <strong>NTLM or Kerberos protocols</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="76">It turns out that with the Kerberos protocol, <strong>a derivative of the user&#8217;s password is used (called a hash) to create the KRB_AS_REP request (in the session key).</strong></p>
<p dir="auto" data-line="76"> </p>
<p dir="auto" data-line="76"><img loading="lazy" decoding="async" class="wp-image-27488 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png" alt="Kerberos authentication explicative scheme" width="664" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png 229w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-47x39.png 47w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication.png 707w" sizes="auto, (max-width: 664px) 100vw, 664px" /></p>
<p dir="auto" data-line="76"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="80">Thus, <strong>an attacker who can retrieve this request could then attempt to crack the user&#8217;s password</strong>. This is exactly what the AsRepCatcher tool attempts to do (hence the name).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="82">To retrieve the KRB_AS_REP request, the tool uses a well-known technique called <strong>ARP Spoofing</strong>:</p>
<p dir="auto" data-line="82"> </p>
<p dir="auto" data-line="82"><img loading="lazy" decoding="async" class="wp-image-27484 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png" alt="" width="741" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png 416w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-768x353.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack.png 925w" sizes="auto, (max-width: 741px) 100vw, 741px" /></p>
<p dir="auto" data-line="82"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="86">An article by <strong>Veracode</strong> explains what ARP spoofing is and how to protect yourself from it: <a href="https://www.veracode.com/security/arp-spoofing/" data-href="https://www.veracode.com/security/arp-spoofing/"><span style="color: #000080;">https://www.veracode.com/security/arp-spoofing/</span></a></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="88">AsRepCatcher modifies the ARP table of legitimate VLAN users, who will now send KRB_AS_REQ requests to the attacker, who can modify them on the fly <strong>by changing the source IP to his own</strong> and also modifying <strong>the encryption algorithms used to create the hash</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This information is important because it allows the attacker to retrieve hashes encrypted with a weak algorithm (in this case <strong>RC4</strong>, provided the KDC authorizes its use), which will greatly facilitate password cracking (a few seconds with RC4 versus several days with AES).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92"><strong>The tool also has features to be more quiet on the network</strong>, such as the option (<strong>—disable-spoofing</strong>) to reset the ARP tables of users whose hash has already been captured.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="94">To protect against the tool, it is therefore recommended to implement remedies against ARP Spoofing and not to allow the RC4 encryption algorithm on the domain.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="96"><em>Tool link: <a href="https://github.com/Yaxxine7/ASRepCatcher" data-href="https://github.com/Yaxxine7/ASRepCatcher"><span style="color: #000080;">https://github.com/Yaxxine7/ASRepCatcher</span></a></em></p>
<p dir="auto" style="text-align: justify;" data-line="96"> </p>
<div style="text-align: justify;">
<h2>How does the national police force use OSINT to track down wanted persons?</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="144"><em>Speaker: Nidhal BEN ALOUI</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="146">Every year, <strong>580,000 people are registered in the Wanted Persons File</strong> (in french: <strong>Fichier des Personnes Recherchés</strong>). Each person has a file containing information about their identity (surname, first name, age, etc.), a photograph, the reason for the search, and the action to be taken if the individual is found.</p>
<p dir="auto" data-line="146"> </p>
<p dir="auto" data-line="146"><img loading="lazy" decoding="async" class=" wp-image-27486 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png" alt="Fichier des personnes recherchées logo" width="304" height="287" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png 202w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo.png 357w" sizes="auto, (max-width: 304px) 100vw, 304px" /></p>
<p dir="auto" data-line="146"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="150">In order to classify the files more easily, <strong>categories</strong> have been created, including:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="152">
<li class="code-line" dir="auto" data-line="152"><strong>AL</strong>: mentally ill;</li>
<li class="code-line" dir="auto" data-line="153"><strong>IT</strong>: banned from the territory;</li>
<li class="code-line" dir="auto" data-line="154"><strong>M</strong>: runaway minors;</li>
<li class="code-line" dir="auto" data-line="155"><strong>PJ</strong>: judicial police searches;</li>
<li class="code-line" dir="auto" data-line="156"><strong>R</strong>: opposition to residence in France;</li>
<li class="code-line" dir="auto" data-line="157"><strong>S</strong>: state security;</li>
<li class="code-line" dir="auto" data-line="158"><strong>T</strong>: debtor to the Treasury;</li>
<li class="code-line" dir="auto" data-line="159"><strong>V</strong>: escapees;</li>
<li class="code-line" dir="auto" data-line="160"><strong>X</strong>: missing persons</li>
<li class="code-line" dir="auto" data-line="161">etc.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="163">The French gendarmerie police force is often called upon to search for people on this list as part of investigations. In order to find these individuals, the gendarmerie will then use <strong>a combination of open source intelligence (OSINT) and closed source intelligence</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="167">For the OSINT part, the use of <strong>social networks, tools, and public websites</strong> is widely favored. A particular attention is paid to the results of public tools, which are never considered certain by the police force. With regard to closed sources, the gendarmerie has <strong>internal tools, databases, and shared national registers</strong> that they can consult during the investigations.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="171">It is also possible for <strong>judicial police officers (OPJ)</strong> to <strong>request access to private information stored by companies</strong> via “derogatory requests”. Or even <strong>to communicate online with potential suspects</strong> via a “pseudonymous investigation.”</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="175">However, <strong>laws very precisely regulate the actions authorized</strong> by the gendarmerie, typically:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="177">
<li class="code-line" dir="auto" data-line="177">Derogatory requests are permitted in the context of <strong>criminal investigations</strong>.</li>
<li class="code-line" dir="auto" data-line="178">Investigations conducted under pseudonyms require a <strong>certification from the Cyber Defense Command</strong> (ComCyber)</li>
<li class="code-line" dir="auto" data-line="179">Each pseudonym and avatar used in the context of an investigation under a pseudonym is <strong>unique and recorded in a list</strong> accessible to all judicial police officers in order to avoid investigating each other</li>
<li class="code-line" dir="auto" data-line="180"><strong>It is not permitted to incite someone to commit a crime</strong> (for example, asking a potential suspect to purchase illegal goods)</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="182">During the conference, two real-life stories were shared to illustrate these concepts.</p>
<p dir="auto" style="text-align: justify;" data-line="182"> </p>
<h2 id="5---purple-team-methodology-and-tooling" class="code-line" dir="auto" style="text-align: justify;" data-line="0">Purple Team: Methodology and tooling</h2>
<p style="text-align: justify;"><em>Speaker: Mael Auzias</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2">This talk, given by Naval Group, tackled the problem of creating a methodology and tooling in order to perform Purple Teams and include them in a larger audit plan to monitor the evolution of the security level and compare different audited scopes.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Indeed, as a part of the missions an internal audit team have, it is important to have defined audit frameworks in order to properly conduct assignments and compare their different results.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="6">To do so, a member of the Red Team worked with the Blue Team of Naval Group to define a specific framework of testing and results reporting, that will ultimately be used to evaluate the detections and responses of each audited party.</p>
<p dir="auto" style="text-align: justify;" data-line="6"> </p>
<h3 id="purple-team-presentation" class="code-line" dir="auto" style="text-align: justify;" data-line="7">Purple Team presentation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">A Purple Team is an exercise during which Red Team and Blue Team work hand in hand, by freely sharing both malicious actions that are executed and detections made. The ultimate goal being to improve both detection capacities and responses made.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">To properly prepare a Purple Team, it is thus important to define:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="11">
<li class="code-line" dir="auto" data-line="11">What kind of attacker profile is to be simulated?</li>
<li class="code-line" dir="auto" data-line="12">What TTPs to focus on during the exercise?</li>
<li class="code-line" dir="auto" data-line="13">What are the targets of the assignment?</li>
<li class="code-line" dir="auto" data-line="14">What are the expected detections and responses?</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="16">Once those points are taken care of, the Purple Team assignment can start.</p>
<p dir="auto" style="text-align: justify;" data-line="16"> </p>
<h3 id="methodology-and-tooling-dedicated-to-the-internal-purple-team-exercises" class="code-line" dir="auto" style="text-align: justify;" data-line="18">Methodology and tooling dedicated to the internal Purple Team exercises</h3>
<h4 id="perform-tests" class="code-line" dir="auto" style="text-align: justify;" data-line="19">Perform tests</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">First, the methodology put in place by Naval Group leverages <a href="https://vectr.io/" data-href="https://vectr.io/"><span style="color: #000080;">VECTR</span></a>, a tool destined to automatize testing and measure detection effectiveness by offering a space to both Red and Blue Teams to collaborate. In this case, it is only used as a wrapper to automatically launch specific attacks and collect responses results.</p>
<p dir="auto" data-line="20"> </p>
<h4 id="grading-system" class="code-line" dir="auto" style="text-align: justify;" data-line="21">Grading system</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Once the attacks are performed and the detection are determined, the actions are classified in the following table:</p>
<p dir="auto" data-line="22"> </p>
<figure id="attachment_27482" aria-describedby="caption-attachment-27482" style="width: 753px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27482" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png" alt="Expected/Observed detection rating" width="753" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-768x253.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table.png 1255w" sizes="auto, (max-width: 753px) 100vw, 753px" /><figcaption id="caption-attachment-27482" class="wp-caption-text"><em>Expected/Observed detection rating</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="22"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="26">Indeed, four cases can be differentiated:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="27">
<li class="code-line" dir="auto" data-line="27">If an observed detection matches the expected one, the tested malicious action gets the higher rating (here, 7)</li>
<li class="code-line" dir="auto" data-line="28">If an observed detection is &#8220;lower&#8221; than the expected one, it gets a poor rating (between 1 to 3 here)</li>
<li class="code-line" dir="auto" data-line="29">If an observed detection is slightly higher (for example a the initiation of an incident investigation instead of a simple event), it gets a rather high rating (between 5 and 6 here)</li>
<li class="code-line" dir="auto" data-line="30">Finally, if an observed reaction is disproportionate regarding its expected one, it gets a low rating: triggering a global cyber crisis for an action that should not raise an alert can be incapacitating for an information system.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="32"><em>PS: here, the different categories do not exactly match the ones that were presented during the event.</em></p>
<p dir="auto" style="text-align: justify;" data-line="32"> </p>
<h4 id="final-grade" class="code-line" dir="auto" style="text-align: justify;" data-line="33">Final grade</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="34">Finally, once every attack categories are tested, a specific math formula computes the final grading of the audited scope in the following graph:</p>
<p dir="auto" style="text-align: center;" data-line="34"> </p>
<figure id="attachment_27480" aria-describedby="caption-attachment-27480" style="width: 449px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27480" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png" alt="Final grading graph" width="449" height="339" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png 253w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph.png 351w" sizes="auto, (max-width: 449px) 100vw, 449px" /><figcaption id="caption-attachment-27480" class="wp-caption-text"><em>Final grading graph</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="34"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="38">This final grading will allow to deduce the performance of the Blue Team, but also monitor the evolution of this of metric over time.</p>
<p dir="auto" style="text-align: justify;" data-line="38"> </p>
<h3 id="conclusion" class="code-line" dir="auto" style="text-align: justify;" data-line="40">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="41">Thus, by defining a clean audit frame to perform Purple Team, it ensures Naval Group to properly assess the performance of the detections made in the different scopes of the company, compare them and monitor the evolutions over time.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="43">This will assurely be proven efficient the more Purple Team exercise are conducted.</p>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<h2>How malicious actors fool researchers with unpopular software</h2>
<div>
<p class="code-line" dir="auto" data-line="228"><em>Speaker: Georgy Kucherin</em></p>
<p class="code-line" dir="auto" data-line="230">The speaker, a vulnerability researcher at Kaspersky, presents a case study encountered during a real-life mission.</p>
<p class="code-line" dir="auto" data-line="232">As a network analyst working for a client, the researcher was struck by a result collected in the <strong>SIEM</strong>.</p>
<p class="code-line" dir="auto" data-line="234">The domain <a href="http://eventuallogic.com/" data-href="http://eventuallogic.com/"><span style="color: #000080;">eventuallogic.com</span></a> is retrieved and analyzed on the well-known Virus Total platform with a score of <strong>1/97</strong> (meaning that one antivirus program recognizes the domain as suspicious or dangerous, compared to 96 that recognize it as safe).</p>
<p class="code-line" dir="auto" data-line="236">Given the result, many would not have looked any further, but Georgy continued his investigation out of curiosity.</p>
<p class="code-line" dir="auto" data-line="238">Upon visiting the website, <strong>the company appears to offer software for compressing files</strong>. Georgy <strong>downloaded it to a VM and tested it</strong>. The tool works well despite recurring ads.</p>
<p class="code-line" dir="auto" data-line="240">At this point, many researchers would classify the software as <strong>PUA (= Potentially Unwanted Application)</strong>, meaning that the software is not desired on a professional workstation (mainly because of the ads), but is not considered dangerous. However, <strong>only the IT department can decide to ban this type of software</strong>; it is not up to analysts at the <strong>SOC (Security Operation Center)</strong> to decide, unless there is evidence of malicious activity linked to this software.</p>
<p class="code-line" dir="auto" data-line="242">Georgy decides to take some time and analyze this software in more depth, starting with an <strong>online sandbox</strong>: <span style="color: #000080;"><a style="color: #000080;" href="http://joesandbox.com/" data-href="http://joesandbox.com/">joesandbox.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="244">The sandbox then runs the software in a controlled environment and analyzes it. This time, the result is <strong>56/100</strong>, indicating that the software failed certain tests.</p>
<p class="code-line" dir="auto" data-line="246">A file named <strong>decrypt.exe</strong> is found in the computer&#8217;s memory when the software is running. This file is retrieved by Georgy and analyzed on Virus Total, with a score of <strong>5/97</strong>. Still not very high, but in the relationships tab, another domain is present: <span style="color: #000080;"><a style="color: #000080;" href="http://decryptables.com/" data-href="http://decryptables.com/">decryptables.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="248">By repeating this method several times, Georgy traced the file back to another domain offering compression software: Let&#8217;s Compress.</p>
<p class="code-line" dir="auto" data-line="250">The software was analyzed again on joesandbox, and this time Georgy found that the compression software executed <strong>a Python file compiled with pyinstaller</strong>.</p>
<p class="code-line" dir="auto" data-line="252">Georgy performed the following actions:</p>
<ul class="code-line" dir="auto" data-line="254">
<li class="code-line" dir="auto" data-line="254">Extract the content with <strong>pyinstxtractor</strong></li>
<li class="code-line" dir="auto" data-line="255">Convert the main.pyc file into <strong>readable Python script</strong></li>
<li class="code-line" dir="auto" data-line="256"><strong>Deobfuscate</strong> the resulting .py script</li>
<li class="code-line" dir="auto" data-line="257"><strong>Decrypt a .json file</strong> created by the script</li>
<li class="code-line" dir="auto" data-line="258">Find a call to a <strong>Command &amp; Control (C2)</strong> infrastructure in this json file</li>
</ul>
<p class="code-line" dir="auto" data-line="260">After all these investigations, here is proof that <strong>the file is malicious</strong>.</p>
<p class="code-line" dir="auto" data-line="262"><strong>The reverse path</strong> was taken in order to verify the link between the malicious file and the detected base domain.</p>
<p class="code-line" dir="auto" data-line="264">The point of all this is to prove that <strong>malicious actors put in place numerous layers to mislead researchers</strong>, and that even a low score from a widely accepted tool such as Virus Total is not enough to judge the trustworthiness of a binary or domain.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="264"> </p>
<div style="text-align: justify;">
<h2>Decompiling malicious binaries for Linux with r2ai</h2>
<div>
<p class="code-line" dir="auto" data-line="1"><em>Speaker: Axelle Apvrille</em></p>
<p class="code-line" dir="auto" data-line="3">During these days where AI meets cybersecurity more than ever, it was impossible not to have a talk about it. In this talk, Axelle presented <strong>r2ai</strong>, a new plugin for radare2, the well-known reverse engineering framework. The idea is simple yet powerful: combine radare2’s disassembly capabilities with a Large Language Model (LLM) to <strong>translate raw assembly into more intelligible source code</strong>.</p>
<p class="code-line" dir="auto" data-line="5">The talk illustrated the tool’s potential with the analysis of <strong>two real-world malware samples</strong>, showcasing both its strengths and limitations.</p>
<p dir="auto" data-line="5"> </p>
<h3 id="case-study-1-a-tiny-but-crafty-shellcode" class="code-line" dir="auto" data-line="6">Case Study 1: A Tiny but Crafty Shellcode</h3>
<p class="code-line" dir="auto" data-line="8">The first sample was a lightweight <strong>4 KB ELF shellcode</strong>, packed with tricks to frustrate static analysis. Looking for strings inside the data section provided nothing of interest, and even <strong>Ghidra</strong> provided little beyond a cryptic <code>swi</code> instruction.</p>
<p class="code-line" dir="auto" data-line="10">With r2ai, however, the story was different, the disassembly became far more readable. The model pointed out <strong>socket creation</strong> and a suspicious <strong>connect-back routine</strong>. But here came an important caveat: LLMs may &#8220;hallucinate&#8221;. For instance, the model initially suggested a connection to <code>127.0.0.1:4444</code>, which turned out to be incorrect after deeper inspection of the actual assembly.</p>
<p class="code-line" dir="auto" data-line="12">Still, the plugin correctly highlighted another key behavior: a call to <code>mprotect</code> modifying stack memory permissions to <strong>RWX</strong>: a typical indicator of a stager preparing to fetch and execute a payload from a C2 server.</p>
<p class="code-line" dir="auto" data-line="14">In this first case, r2ai showed how it could accelerate the discovery of high-level logic, while human analysts remained essential to validate and correct its interpretation.</p>
<p dir="auto" data-line="14"> </p>
<h3 id="case-study-2-trigona-ransomware-on-linux" class="code-line" dir="auto" data-line="17">Case Study 2: Trigona Ransomware on Linux</h3>
<p class="code-line" dir="auto" data-line="19">The second sample was <strong>Trigona</strong>, a ransomware family usually seen in Windows environments, but with an unexpected <strong>Linux variant</strong> dating back to May 2023. Interestingly, the code was written in <strong>Delphi</strong>—a surprising choice that puzzled many in the audience.</p>
<p class="code-line" dir="auto" data-line="21">Although Trigona was thought to be inactive, <strong>samples were still circulating as of April 2025</strong>, making the analysis particularly relevant.</p>
<p class="code-line" dir="auto" data-line="23">Here, r2ai required extra tuning (increasing the maximum tokens of the model&#8217;s context) to compensate with the binary’s size, but it revealed crucial behaviors:</p>
<ul class="code-line" dir="auto" data-line="24">
<li class="code-line" dir="auto" data-line="24">Shutting down <strong>virtual machines</strong> to maximize disruption,</li>
<li class="code-line" dir="auto" data-line="25">Locating and encrypting documents,</li>
<li class="code-line" dir="auto" data-line="26">Implementing data <strong>exfiltration</strong> before encryption.</li>
</ul>
<p class="code-line" dir="auto" data-line="28">The researchers emphasized how quickly they could map the <strong>entire kill chain</strong>, compared with traditional workflows in IDA Pro or Ghidra.</p>
<p dir="auto" data-line="28"> </p>
<h3 id="limits-and-takeaways" class="code-line" dir="auto" data-line="30">Limits and Takeaways</h3>
<p class="code-line" dir="auto" data-line="31">The presentation ended with a discussion of r2ai’s limitations:</p>
<ul class="code-line" dir="auto" data-line="32">
<li class="code-line" dir="auto" data-line="32"><strong>Token constraints</strong>: long analyses may crash or become expensive,</li>
<li class="code-line" dir="auto" data-line="33"><strong>Accuracy</strong>: while LLMs can explain syscalls and control flow, they sometimes &#8220;invent&#8221; values or logic that analysts must double-check,</li>
<li class="code-line" dir="auto" data-line="34"><strong>Complementary use</strong>: r2ai doesn’t replace standard tools but rather enhances them, accelerating hypothesis-building.</li>
</ul>
<p class="code-line" dir="auto" data-line="36">Still, the experiment showed that coupling an AI model with a disassembler opens new perspectives: <strong>interactive reverse engineering with natural language queries</strong>.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<div>
<div>
<h2>Scanning a network without an IP address, a good idea ?</h2>
<p><em>Speakers: Julien M. &amp; Francis H.</em></p>
<p class="code-line" dir="auto" data-line="49">This presentation, given by Naval Group, introduced a way of scanning a network without displaying its IP address by combining the way of functioning of two basic protocols. Two employees were on stage, one form the Red Team and one from the Blue Team.</p>
<p dir="auto" data-line="49"> </p>
<h3 id="the-protocol-basics" class="code-line" dir="auto" data-line="50">The protocol basics</h3>
<p class="code-line" dir="auto" data-line="51">To understand the following presentation, it is important to go over two famous protocols: ARP (Address Resolution Protocol) and TCP (Transmission Control Protocol).</p>
<h4 id="arp" class="code-line" dir="auto" data-line="52">ARP</h4>
<p class="code-line" dir="auto" data-line="53">ARP is a protocol dedicated to the discovery of assets present in a network, by associating a MAC address and an IP address.</p>
<p class="code-line" dir="auto" data-line="55">To perform this discovery step, broadcast requests are sent to ask for the MAC address corresponding to a specific destination IP address if the latter is not known by the network equipment (for example, a router).</p>
<p dir="auto" data-line="55"> </p>
<h4 id="tcp" class="code-line" dir="auto" data-line="56">TCP</h4>
<p class="code-line" dir="auto" data-line="57">TCP is a communication protocol ensuring reliable, ordered, error-checked data deliver. it relies on SYN requests sent by a source to a destination. Different answers can be expected depending on the accessibility of the destination port:</p>
<ul class="code-line" dir="auto" data-line="58">
<li class="code-line" dir="auto" data-line="58">If the port is filtered, no answer is sent back as the SYN packet does not reach the destination</li>
<li class="code-line" dir="auto" data-line="59">If the port is closed, a RST packet is sent back to the source</li>
<li class="code-line" dir="auto" data-line="60">If the port is opened, a SYN+ACK packet is sent back.</li>
</ul>
<p class="code-line" dir="auto" data-line="62">Another case can be differnciated: if the port is opened but the source disapears of the network (for example after a network shortage), the SYN+ACK packet is sent several times (for example, 5 for some equipment) by the destination in order to continue the TCP exchange.</p>
<p dir="auto" data-line="62"> </p>
<h3 id="gathering-arp-and-tcp-and-maths" class="code-line" dir="auto" data-line="64">Gathering ARP and TCP (and maths)</h3>
<p class="code-line" dir="auto" data-line="65">Thus, a new methodology of scanning emerges of the combination of the way of functionning of ARP and TCP.</p>
<p class="code-line" dir="auto" data-line="67">The goal is to craft a specific SYN packet, by forging the source address to chose an IP address that is not currently in use in the network, and send it to the victim on the chosen port. Following the response of the destination, and since the source IP adress is unknown by the router, the latter will send ARP broadcast requests to find the source. Furthermore, the number of ARP requests will depend on the state of the port:</p>
<ul class="code-line" dir="auto" data-line="68">
<li class="code-line" dir="auto" data-line="68">If the port is filtered, there will be no response sent by the destination, and thus no ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="69">If the port is closed, there will be one RST packet sent by the destination to the unknown source, and thus one ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="70">If the port is opened, there will be several SYN+ACK packets as there won&#8217;t be ACK packets sent back by the unknown source, thus several ARP broadcast requests</li>
</ul>
<p class="code-line" dir="auto" data-line="72">The attacker will just have to monitor the number of ARP broadcast requests related to the impersonated unknown IP address to deduce the state for the scanned port.</p>
<p class="code-line" dir="auto" data-line="74">However, some limitations exist: for example, the fact that the number of SYN+ACK packets vary may induce a number of false positive, and makes it more difficult to develop reliable tools.</p>
<p dir="auto" data-line="74"> </p>
<h3 id="what-does-the-soc-have-to-say" class="code-line" dir="auto" data-line="76">What does the SOC have to say?</h3>
<p class="code-line" dir="auto" data-line="77">Following the presentation of this methodology, the member of the Blue Team explained the point of view of the SOC regarding this scanning technique.</p>
<p class="code-line" dir="auto" data-line="79">First, it is important to say that while this scanning technique is quite difficult to detect in real life scenarios, it is only one way out of many to scan a network, which thus represents a tiny fraction of scanning scenario (regarding a MITRE ATT&amp;CK matrix) a SOC has to cover.</p>
<p class="code-line" dir="auto" data-line="81">Additionally, this scanning scenario only happens when the network has first been breached, and is not the end of the killchain as well. The Blue Team has several other defense mechanisms to stop attacks either upstream or downstream of this malicious action.</p>
<p dir="auto" data-line="81"> </p>
<h3 id="conclusion-1" class="code-line" dir="auto" data-line="83">Conclusion</h3>
<p class="code-line" dir="auto" data-line="84">Thus, even if this scanning method is quite ingenious, the Blue Teams may not be forced to take it into account and spend time resolving the issue. This conclusion may be even generalized to other future findings: a Blue Team must chose its battle, regarding the severity of the attack techniques and the manpower at disposal.</p>
</div>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="84"> </p>
<div style="text-align: justify;">
<h2>A Tale of Two Reports: The Trivial Things We&#8217;re Told vs. The Vital Things We&#8217;re Not</h2>
<div>
<div>
<div>
<p class="code-line" dir="auto" data-line="69"><em>Speaker: Koreth</em></p>
<p class="code-line" dir="auto" data-line="71">This talk was all about a problem everyone in security knows too well: we’re buried under alerts, notifications, and reports — but the truly important ones are often the first to be missed.</p>
<p class="code-line" dir="auto" data-line="73">Silent Ghost kicked things off with some well-known examples. Take the Target breach: 70 million credit cards leaked, and the warning was there, but it looked too much like spam, so nobody acted. Same story in Rouen (2019), where a phishing email dropped malware that spread laterally across the network. The initial alert was flagged, but ignored. Colonial Pipeline in 2021? Again, a notification existed — but nobody paid attention.</p>
<p class="code-line" dir="auto" data-line="75">And this isn’t a new issue. Back in 2016, the NSA lost sensitive data because an employee simply used a USB stick to exfiltrate it. SolarWinds in 2019 showed how dangerous a compromised CICD pipeline could be, yet very few people noticed the early signs. More recently, Kiabi (2024) faced a €100 million fraud from an internal accountant — red flags were there, but lost in the noise.</p>
<p class="code-line" dir="auto" data-line="77">The structural issue is clear: only 0.13% of pull requests are labeled “security,” while closer to 15% actually involve security. That gap means real vulnerabilities are hidden in plain sight. Silent Ghost pointed out one CVE that took more than 100 undocumented fixes before it was officially recognized.</p>
<p class="code-line" dir="auto" data-line="79">Bug bounty programs suffer the same fate. Running private programs at YesWeHack, he sees inboxes flooded with overblown or poorly written reports: emails describing “CVSS 10” vulnerabilities that turn out to be nothing more than a misconfigured header or an exposed Google Maps API key. The sheer volume of this noise risks burying the handful of truly critical findings.</p>
<p class="code-line" dir="auto" data-line="81">The takeaway was clear: as an industry, we need to cut the noise. Fewer useless notifications, better triage, and clearer reporting standards would help ensure the important alerts get through. Otherwise, the next major breach alert will end up ignored just like the last.</p>
</div>
<div> </div>
</div>
</div>
</div>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;">
<div>
<h2>OASIS &#8211; Ollama Automated Security Intelligence Scanner</h2>
<p class="code-line" dir="auto" data-line="40"><em>Speaker: psyray (Raynald Coupé)</em></p>
<p class="code-line" dir="auto" data-line="42">Another presentation around the usage of AI in the cybersecurity was held about <strong>OASIS</strong>, an open-source framework designed to analyze source code with the help of AI models, with an accent on <strong>confidentiality</strong>.</p>
<p class="code-line" dir="auto" data-line="44">Its creator developed the tool out of necessity: traditional SaaS-based AI solutions raise concerns when working on sensitive client code, making <strong>local deployment a must</strong>.</p>
<p class="code-line" dir="auto" data-line="46">As its name implies, OASIS relies on <strong>Ollama</strong>, a lightweight system that allows developers to run large language models on their own infrastructure. The result is a practical solution for secure, scalable, and customizable code audits.</p>
<p dir="auto" data-line="46"> </p>
<h3 id="architecture-and-workflow" class="code-line" dir="auto" data-line="48">Architecture and Workflow</h3>
<p class="code-line" dir="auto" data-line="49">At a technical level, OASIS relies on a <strong>semantic embedding system</strong>: source code is transformed into vectors, enabling contextual analysis beyond simple pattern matching. This foundation allows the AI to spot vulnerabilities in a way that resembles human reasoning. The tool offers multiple modes of operation</p>
<ul class="code-line" dir="auto" data-line="51">
<li class="code-line" dir="auto" data-line="51"><strong>Audit Mode</strong>: A quick scan to flag high-risk areas in large codebases. By tuning thresholds, analysts can minimize false positives while still obtaining a strong first-pass overview,</li>
<li class="code-line" dir="auto" data-line="52"><strong>Standard Scan</strong> (two-phase):
<ol class="code-line" dir="auto" data-line="53">
<li class="code-line" dir="auto" data-line="53">A <strong>lightweight model</strong> highlights potentially suspicious code,</li>
<li class="code-line" dir="auto" data-line="54">A <strong>more powerful model</strong> performs deep analysis of the flagged sections. This is ideal for large projects with consistent risk profiles.</li>
</ol>
</li>
<li class="code-line" dir="auto" data-line="55"><strong>Adaptive Scan</strong> (multi-level):
<ol class="code-line" dir="auto" data-line="56">
<li class="code-line" dir="auto" data-line="56">A <strong>static scan</strong> with patterns and regex (fast and without AI),</li>
<li class="code-line" dir="auto" data-line="57">A <strong>lightweight model</strong> scans for surface issues,</li>
<li class="code-line" dir="auto" data-line="58">A <strong>contextual analysis</strong> with risk scoring,</li>
<li class="code-line" dir="auto" data-line="59">An <strong>in-depth review</strong> using a heavyweight model,</li>
<li class="code-line" dir="auto" data-line="60">This tiered approach ensures flexibility: from a quick audit to a comprehensive deep dive.</li>
</ol>
</li>
</ul>
<p> </p>
<h3 id="detection-capabilities" class="code-line" dir="auto" data-line="62">Detection Capabilities</h3>
<p class="code-line" dir="auto" data-line="63">OASIS is designed to catch a wide range of issues, including</p>
<ul class="code-line" dir="auto" data-line="64">
<li class="code-line" dir="auto" data-line="64"><strong>Web vulnerabilities</strong>: XSS, XXE, CSRF,</li>
<li class="code-line" dir="auto" data-line="65"><strong>Authentication flaws</strong>,</li>
<li class="code-line" dir="auto" data-line="66"><strong>Sensitive data exposure</strong>,</li>
<li class="code-line" dir="auto" data-line="67"><strong>Configuration errors</strong> such as path traversal or weak cryptographic suites.</li>
</ul>
<p class="code-line" dir="auto" data-line="69">The framework supports <strong>multiple programming languages</strong> and can even generate <strong>Burp Suite requests</strong> to validate findings.</p>
<p dir="auto" data-line="69"> </p>
<h3 id="reporting-and-outputs" class="code-line" dir="auto" data-line="71">Reporting and Outputs</h3>
<p class="code-line" dir="auto" data-line="72">Beyond detection, OASIS generates structured reports in <strong>PDF, Markdown, or HTML</strong>, documenting:</p>
<ul class="code-line" dir="auto" data-line="73">
<li class="code-line" dir="auto" data-line="73">The complete <strong>attack chain</strong> for each vulnerability (entry point, exploitation path, potential impact),</li>
<li class="code-line" dir="auto" data-line="74"><strong>Remediation recommendations</strong>, helping developers fix issues quickly.</li>
</ul>
<p class="code-line" dir="auto" data-line="76">This makes the reports usable both for technical teams and for managers needing a higher-level view of project risk.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="76"> </p>
<h2 dir="auto" style="text-align: justify;" data-line="76">Post-Incident Lessons from an Industrial Cyber Breach</h2>
<p style="text-align: justify;"><em>Speakers: Hack’im et Antxine</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This talk was given by two speakers regarding a post-incident feedback.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92">Indeed, one of their client contacted them after plugging in an USB flash drive on a standard workstation where an EDR triggered an alert. It was suspicious in that case because this flash drive did not raise alerts before, and was only used to update a standalone server separated form the rest of the network.</p>
<p dir="auto" style="text-align: justify;" data-line="92"> </p>
<h3 id="beginning-of-the-investigation" class="code-line" dir="auto" style="text-align: justify;" data-line="94">Beginning of the investigation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="95">Thus, the focus was made on the server, likely to be infected by a malicious program which propagated to the flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="97">Using classic tools to retrieve the 900GB of the server and analyze the filesystem and evtx files, they discovered a hidden suspicious program in the <code>%APPDATA%</code> folder called <code>aL4N.exe</code>. Indeed, an unkown executable such as this one should not be in this folder, raising the interest of the investigators.</p>
<p dir="auto" style="text-align: justify;" data-line="97"> </p>
<h3 id="al4nexe" class="code-line" dir="auto" style="text-align: justify;" data-line="99">aL4N.exe</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="100">Using VirusTotal to evaluate the dangerousness of the executable, it showed a detection index of 52/94, being concerning and then driving the investigators to continue their assessment in this direction.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="102">Following this lead, they discovered that this malwere has been present on the server from the mastering of the latter, back in 2016, and was brought up by a flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="104">Traces of earlier in-house investigations were found, with a file mentionning the presence of <code>aL4N.exe</code> found by employees.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="107">Written in AutoIT, this malware establishes a communication tunnel to a C2 (Command &amp; Control) server. However, in the case of this malware, when configured, the malicious actor set the remote server address to <code>localhost</code>, denoting a lack of knowledge from the initiator of the attack.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="109">The replication system of this malware is however less classic. As soon as an external storage of more of 1GB is attached to an infected target, <code>aL4N.exe</code> will create a <code>My Pictures</code> folder and hide it, copy itself in it and create a shortcut for <code>My Pictures</code> that will execute <code>aL4N.exe</code> upon clicking.</p>
<p dir="auto" style="text-align: justify;" data-line="109"> </p>
<h3 id="conclusion-2" class="code-line" dir="auto" style="text-align: justify;" data-line="111">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="112">The main takeout of this talk is to install detection mechanisms on every components of an IS, even if they are separated for the main network. It is also possible to put in place efficient detection and cleaning stations for flash drives to sanitize removable storage devices, even if the ones of this company did not detecte <code>aL4N.exe</code>.</p>






<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CI/CD: the new cornerstone of the Information system? </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre GUY]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 08:49:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Monitoring and supervision]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<category><![CDATA[Segmentation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27556</guid>

					<description><![CDATA[<p>Since the massive rise of DevOps, continuous integration and deployment (CI/CD) pipelines have become essential to automate application development cycles. Continuous Integration (CI) involves merging and testing code automatically, while Continuous Deployment (CD) automates the entire process of releasing that...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/">CI/CD: the new cornerstone of the Information system? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Since the massive rise of DevOps, </span><b><span data-contrast="none">continuous integration</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">deployment</span></b> <span data-contrast="auto">(CI/CD) pipelines have become essential to automate application development cycles. </span><b><span data-contrast="none">Continuous Integration</span></b> <span data-contrast="auto">(CI) involves merging and testing code automatically, while </span><b><span data-contrast="none">Continuous Deployment</span></b> <span data-contrast="auto">(CD) automates the entire process of releasing that code into production, ensuring it runs properly in its target environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Attacks targeting these supply chains have opened a new perimeter of risk in information systems. Breaches can lead to intellectual property theft, tampering with source code, service disruption, and privilege escalation into more critical parts of the IT landscape.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">What are the </span><b><span data-contrast="none">new</span></b> <b><span data-contrast="none">attack</span></b> <b><span data-contrast="none">vectors</span></b> <span data-contrast="auto">in CI/CD pipelines, and how can they be </span><b><span data-contrast="none">contained</span></b><span data-contrast="auto">? This article reviews real-world compromise scenarios and provides recommendations to defend against them.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">What risks for CI/CD pipelines?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The 2020 </span><b><span data-contrast="none">SolarWinds</span></b> <span data-contrast="auto">breach is very often cited as CI/CD compromise, as it revealed the true scale of that such an attack can cause. After supposedly stealing FTP credentials left in plaintext in an old GitHub repository, attackers poisoned SolarWinds’ supply chain by inserting a C2 beacon into Orion, its network management software, before the signing process.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This backdoor gave adversaries </span><b><span data-contrast="none">months</span></b> <span data-contrast="auto">of </span><b><span data-contrast="none">undetected</span></b> <b><span data-contrast="none">access</span></b> <span data-contrast="auto">to the internal networks of U.S. government agencies and private companies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Incidents like this, along with more recent ones such as Log4Shell, Codecov, and XZ Utils, highlight not only the need for stronger CI/CD security but also for a more adaptive incident response. OWASP published a dedicated overview for CI/CD Security in their </span><a href="https://owasp.org/www-project-top-10-ci-cd-security-risks/"><span data-contrast="none">Top 10</span></a><span data-contrast="auto">, mapping out the most common areas of risk.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:708}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27501" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1.png" alt="Fig 1 – Top 10 OWASP CICD-Sec " width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive1-800x450.png 800w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 1 – Top 10 OWASP CICD-Sec</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:360}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Field insights @ Wavestone</span></b></h1>
<h1 style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"><b><span data-contrast="none">Audits</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">penetration tests</span></b><span data-contrast="auto"> help identify vulnerabilities proactively before attackers can exploit them. By simulating real-world attacks, these assessments provide concrete visibility into how systems can be compromised.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Our recent client engagements have led to clear findings:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">In nearly all </span><b><span data-contrast="none">Cloud</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">CI/CD</span></b> <b><span data-contrast="none">audits</span></b><span data-contrast="auto">, vulnerabilities are always discovered in pipelines, often enabling full control of the pipeline, its artifacts, or even underlying infrastructure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">In </span><b><span data-contrast="none">CERT</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">Red</span></b> <b><span data-contrast="none">Team</span></b> <span data-contrast="auto">interventions, CI/CD pipelines frequently act as accelerators in attack paths.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Here are two examples observed in the field.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Example 1: </span></b><span data-contrast="auto">Full AWS compromise through CI/CD abuse</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this first grey-box example, we compromised an entire AWS Cloud environment (600+ accounts) starting from standard DevOps accounts.</span><span data-ccp-props="{}"> </span></p>
<figure id="attachment_27503" aria-describedby="caption-attachment-27503" style="width: 1280px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-27503" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2.png" alt="Fig 2 - Chemin de compromission d’une attaque sur un cluster d’Amazon EKS " width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive2-800x450.png 800w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /><figcaption id="caption-attachment-27503" class="wp-caption-text">Fig 2 &#8211; Chemin de compromission d’une attaque sur un cluster d’Amazon EKS</figcaption></figure>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 2: Full AWS compromise through CI/CD abuse</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Attack path:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">An attacker pushed </span><b><span data-contrast="none">malicious</span></b> <b><span data-contrast="none">code</span></b> <span data-contrast="auto">into a GitLab repository, triggering a GitLab CI pipeline that deployed the code into a generic Kubernetes pod.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The code opened a </span><b><span data-contrast="none">reverse</span></b> <b><span data-contrast="none">shell</span></b><span data-contrast="auto">, giving the attacker remote access to the Kubernetes environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">From there, the attacker exploited </span><b><span data-contrast="none">excessive</span></b> <b><span data-contrast="none">privileges</span></b> <span data-contrast="auto">granted to the node’s service account (ability to patch tokens in the cluster) and replaced the admin node’s token.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">On redeployment, the malicious pod lands on the former admin node, still holding admin rights.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The attacker </span><b><span data-contrast="none">escalated</span></b> <b><span data-contrast="none">privileges</span></b> <span data-contrast="auto">and pivoted into AWS, compromising the entire Elastic Kubernetes Service (EKS) cluster and its resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Example 2: </span></b><span data-contrast="auto">Chained attacks across pipeline components</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27505" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive3-e1758008947607.png" alt="Fig 3 - Condensé de plusieurs typologies d’attaques observées dans les CI/CD de nos clients " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 3 -Summary of real chained</span></i><i><span data-contrast="auto"> attacks across pipeline components</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In another case (presented at </span><a href="https://www.riskinsight-wavestone.com/en/2022/10/wavestones-cyber-summer/"><span data-contrast="none">DefCon &amp; BSides 2022</span></a><span data-contrast="auto">), we demonstrated how multiple components of a CI/CD pipeline can be chained together in compromise scenarios. [</span><a href="https://www.youtube.com/watch?v=a3SeASgtINY"><span data-contrast="none">Video</span></a><span data-contrast="auto">].</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Recommendations to secure a CI/CD</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">CI/CD pipelines have now become systemic components of information systems and can be leveraged to compromise an organization’s most critical resources.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Our recommendations for securing the CI/CD chain can be grouped into three main themes: </span><b><span data-contrast="none">identity</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">access management</span></b> <span data-contrast="auto">(IAM), better </span><b><span data-contrast="none">pipeline design</span></b><span data-contrast="auto">, and </span><b><span data-contrast="none">continuous monitoring</span></b><span data-contrast="auto">. These align with the </span><a href="https://cyber.gouv.fr/publications/devsecops"><span data-contrast="none">ANSSI DevSecOps guidance</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:708}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27507" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive4-e1758009062200.png" alt="Fig 4 - Trois grands axes de recommandations pour sécuriser une CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 4 &#8211; Three main recommendations to secure a CI/CD</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"> </h2>
<h1 style="text-align: justify;"><b><span data-contrast="auto">Identity and Access Management (IAM)</span></b><span data-ccp-props="{}"> </span></h1>
<p style="text-align: justify;"><span data-contrast="auto"> </span><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27509" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive5-e1758009180837.png" alt="Fig 5 – Recommandations IAM" width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 5 – IAM recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Identity management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Beyond the traditional rules for managing identity lifecycles, it is strongly recommended to systematically use </span><b><span data-contrast="none">Single Sign-On</span></b> <span data-contrast="auto">(SSO) combined with </span><b><span data-contrast="none">Multi-Factor Authentication</span></b> <span data-contrast="auto">(MFA). This significantly reduces the risk of intrusion into the CI/CD chain, by ensuring that any user accessing code repositories, signing commits, or performing other privileged actions is properly authenticated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<h2> </h2>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Access control</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">User and service account permissions must be strictly limited to what is necessary for their role within the CI/CD chain, always applying the principle of least privilege. This should be enforced through </span><b><span data-contrast="none">Role-Based Access Control</span></b> <span data-contrast="auto">(RBAC). For example, a developer working on a specific project generally should not have write access to the overall pipeline configuration.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is also advisable to segment projects using </span><b><span data-contrast="none">separate</span></b> <b><span data-contrast="none">code</span></b> <b><span data-contrast="none">repositories</span></b><span data-contrast="auto">, and to ensure that the orchestrator account of one project does not hold excessive rights over the deployments of projects it is not associated with.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2> </h2>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Secrets management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">In CI/CD, “</span><b><span data-contrast="none">secrets</span></b><span data-contrast="auto">” refer to sensitive data such as passwords, API keys, certificates, or access tokens. Since these secrets often enable privileged actions within pipelines, they must be retrieved in an automated and controlled manner.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Vendors such as </span><a href="https://www.hashicorp.com/products/vault"><span data-contrast="none">HashiCorp</span></a><span data-contrast="auto"> provide dedicated </span><b><span data-contrast="none">secret management solutions</span></b> <span data-contrast="auto">that make it possible to store sensitive data centrally, while ensuring encryption in transit and at rest.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><b><span data-contrast="auto">CI/CD pipeline design</span></b><span data-ccp-props="{}"> </span></h1>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27511" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive6-e1758009516245.png" alt="Fig 6 – Recommandations sur la conception d’une CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 6 – Design recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Environment segmentation</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><b><span data-contrast="none">Segregation</span></b> <span data-contrast="auto">between users, applications, and infrastructure is essential to minimize the impact of a compromise. In line with ANSSI’s guidance, actions performed by the production CI/CD chain should be treated as administrative actions, and the number of users authorized to access it should be kept to an absolute minimum. Furthermore, communication between environments must be protected with </span><b><span data-contrast="none">end-to-end encryption</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Integration of third-party tools</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As the SolarWinds attack demonstrated, many </span><b><span data-contrast="none">supply-chain</span></b> <span data-contrast="auto">compromises originate from a third-party component integrated into a CI/CD pipeline. These tools are indispensable for supply-chain operation: they may be as small as a development add-on, or as central as a version control system or orchestrator.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Because these tools are often granted high privileges—access to sensitive resources or the ability to perform critical actions within the pipeline—a vulnerability that is left unpatched can be catastrophic. In many cases, the ability to remediate will depend on the vendor, limiting the organization’s own control. A </span><b><span data-contrast="none">strict</span></b> <b><span data-contrast="none">governance</span></b> <span data-contrast="auto">framework and a </span><b><span data-contrast="none">Third-Party Cyber Risk Management (TCPCRM)</span></b> <span data-contrast="auto">process for third-party tools is therefore necessary.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Artifact management</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To avoid the risk of distributing </span><b><span data-contrast="none">malicious artifacts</span></b><span data-contrast="auto">, it is recommended to sign artifacts as early as possible in the pipeline, and to verify those signatures at deployment time to guarantee their </span><b><span data-contrast="none">integrity</span></b><span data-contrast="auto">. Similarly, regular </span><b><span data-contrast="none">Software Composition Analysis</span></b> <span data-contrast="auto">(SCA) should be performed to prevent the introduction of malicious libraries.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Monitoring and supervision</span></b><span data-ccp-props="{}"> </span></h2>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27513" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive7-e1758009660158.png" alt="Fig 7 – Recommandations de surveillance " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 7 – Monitoring recommendations</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Logging and detection</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Maintaining a high level of visibility and control over all pipeline components is critical for easier maintenance and faster response to attacks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A tailored </span><b><span data-contrast="none">logging</span></b> <span data-contrast="auto">strategy should be implemented: logs must contain only the data needed to ensure traceability and accountability in the event of an incident, should be stored securely, and must not contain secrets in plaintext. Logs should be shared effectively with the organization’s Security Information and Event Management (SIEM) system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Regular </span><b><span data-contrast="none">audits</span></b> <span data-contrast="auto">and </span><b><span data-contrast="none">penetration tests</span></b> <span data-contrast="auto">are also required to reassess the security posture and identify potential new compromise paths within the CI/CD pipeline.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Incident response</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Finally, CI/CD pipelines must be included in incident response plans just like any other perimeter of the information system. This means ensuring that source code and configurations are backed up, and that business continuity plans exist in case of a tool failure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><b><span data-contrast="auto">In conclusion</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">CI/CD pipelines have become a genuine </span><b><span data-contrast="none">cornerstone</span></b> <span data-contrast="auto">of modern information systems. They are now systemic components, indispensable for developing and deploying applications. Yet their critical role within IT also makes it necessary to implement appropriate security measures so that they do not themselves become attack vectors.</span><span data-ccp-props="{&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27515" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Diapositive8-e1758009992895.png" alt="Fig 8 – Quelques composants systémiques et critiques en CI/CD " width="1280" height="720" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Figure 8 – Some systemic CI/CD components</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Beyond the recommendations detailed in this article, further preventive measures can be implemented in the form of </span><b><span data-contrast="none">hardening</span></b> <b><span data-contrast="none">guides</span></b> <span data-contrast="auto">tailored to </span><b><span data-contrast="none">specific tools</span></b> <span data-contrast="auto">within the pipeline. In addition, adopting a robust </span><b><span data-contrast="none">training</span></b> <span data-contrast="auto">strategy for users, together with structured </span><b><span data-contrast="none">change</span></b> <b><span data-contrast="none">management</span></b><span data-contrast="auto">, is essential to ensure the success of these transformations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:708}"><em>Thanks to Jeanne GRENIER for her valuable contribution to the writing of this article.</em></span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/">CI/CD: the new cornerstone of the Information system? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/ci-cd-the-new-cornerstone-of-the-information-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyberattacks in 2021: ransomwares, still threat n°1</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 11:23:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[benchmark]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[Incident response]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17170</guid>

					<description><![CDATA[<p>On the launch of the European Cybersecurity Month and for the Assises de la Sécurité (from 13 to 16 October 2021), Wavestone unveils the new edition of its benchmark of cybersecurity incidents.  To this end, we reviewed the interventions of the CERT-Wavestone crisis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">On the launch of the European Cybersecurity<strong> Month and for the Assises de la Sécurité</strong> (from 13 to 16 October 2021), <strong>Wavestone unveils the new edition of its benchmark of cybersecurity incidents</strong>.  To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.</p>
<p style="text-align: justify;">This represents <strong>60 major security incidents</strong> that led to business interruption or advanced IS compromise in a diverse sector:  industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is <strong>to shed light on and show the evolution of the state of the cyber threats, </strong>whilst also providing the keys for better anticipation and reaction.</p>



<h2 class="wp-block-heading"><strong>A strong preponderance of ransomware in the panorama of cyberattacks</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1255" height="505" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png" alt="" class="wp-image-17195" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-768x309.png 768w" sizes="auto, (max-width: 1255px) 100vw, 1255px" /></figure></div>



<p>  </p>
<p style="text-align: justify;">Ransomware accounts for<strong> 60%</strong> of the cyberattacks encountered by CERT-W for our customers. Furthermore, attackers are becoming increasingly more organized and skilled at carrying out more effective attacks</p>



<p><em>&#8220;Cybercriminal groups have succeeded in their digital transformation and their organization into a platform has made it possible to majorly make their attacks more efficient and faster&#8221; Gerôme Billois, Partner Cybersecurity</em></p>



<p style="text-align: justify;">Beyond the simple blocking of the IS, <strong>the combination with data theft is becoming more and more present</strong>. Indeed, <strong>30%of the ransomware attacks observed  include combine the blocking of the IS and the theft of data</strong>,  the latter being an additional lever to obtain financial gains.</p>



<h2 class="wp-block-heading"><strong>Faster and more targeted ransomware</strong> <strong>attacks</strong></h2>



<p style="text-align: justify;">We see a reduction in the average time between initial access and deployment of ransomware in the system with<strong> a minimum of 3 days for the fastest attack and an average of 25 days</strong> on managed cases. Attackers are becoming <strong>more and more determined to harm their victims</strong>.  Indeed, they now go so far as to target and destroy the backup mechanisms  in order to force the payment of the ransom  (21% of  cases).</p>
<p style="text-align: justify;">We also find that in<strong> 90% of cases data has been irretrievably lost.</strong> It should be noted that  we are seeing a significant decrease in ransom payments this year (from 20% the previous year to 5% of cases). Multiple factors can  explain  this decrease, between the better understanding of the low interest to be paid  (the payment of the ransom does not accelerate the time of resolution of the crisis), the actions of awareness  and pressure on the payment intermediaries by the different authorities.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="2000" height="1125" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png" alt="" class="wp-image-17191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png 2000w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-800x450.png 800w" sizes="auto, (max-width: 2000px) 100vw, 2000px" /></figure></div>



<p>   </p>



<h2 class="wp-block-heading"><strong>Other types of attacks are still raging in the background</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1974" height="1076" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png" alt="" class="wp-image-17193" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png 1974w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-768x419.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-1536x837.png 1536w" sizes="auto, (max-width: 1974px) 100vw, 1974px" /></figure></div>



<div class="row-container onepage-section" data-parent="true" data-label="Parce qu'il est important de faire du maillage interne" data-name="parce-quil-est-important-de-faire-du-maillage-interne" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p> </p>
<p style="text-align: justify;">The ransomware threat should not make us forget the attacks <strong>of data theft, fraud and the gain in attack capacity that remain well present (25%)</strong> even if they are less frequent.  </p>
<p style="text-align: justify;">When it comes to accessing channels to break into systems, the main gateways are still the <strong>use of valid accounts (23%), fraudulent emails,  <em>phishing</em>  to obtain information (20%) and remote access services using security vulnerabilities or configuration defects  (18%)</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="6">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="heading-text el-text">
<h2 class="h2"> </h2>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>



<h2 class="wp-block-heading"><strong>How not to be an easy target? Some tips from CERT-W</strong></h2>



<div class="uncode_text_column">
<p style="text-align: justify;"><strong>56% of victims did not anticipate </strong>being the <strong>potential</strong> <strong>target  of a </strong> <strong>cyberattack.</strong> They  did not have an incident response contract or a cyber insurance and 42% of  victims had not thought about  their resilience in the event of an attack</p>
</div>



<p>&#8220;Even if diplomatic and judicial actions have weakened the cybercriminal ecosystem, it is not a question of stopping efforts, we must prepare now thanks to simple actions to put in place&#8221; Nicolas Gauchard, Head of CERT-W</p>



<div class="messagebox_text style-accent-bg">
<p><span style="color: #503078;"><strong>The most important actions are known:</strong></span></p>
<ol>
<li><span style="color: #503078;"><strong>Identify and protect the most critical systems and data, including mention technical systems such as Active  Directory</strong></span></li>
<li><span style="color: #503078;"><strong>Improve the efficiency of attack detection with a specialized 24/7 service</strong></span></li>
<li><span style="color: #503078;"><strong>Know how to manage a major crisis by training through crisis management exercises</strong></span></li>
<li><span style="color: #503078;"><strong>Strengthen backup security and practice rebuilding immediately</strong></span></li>
<li><span style="color: #503078;"><strong>Subscribe to a cyber insurance and a contract with a specialized service in case of crisis</strong></span></li>
</ol>
</div>
<p> </p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Download the publication</a></div>



<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Contact-us</a></div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
