The real-life risks your company is facing

Discover through selected use cases how information leaks threaten your company's physical security, business continuity and brand reputation.

  • Break-in at Platinum Leather

    Sensitive blueprints can be unwittingly leaked by third parties...

  • Aborted M&A for Blue Industry Group

    Leaked information can kill deals...

  • System meltdown at Great Software Ltd

    Credentials stored as plain text can be lethal...

  • GDPR violation for Mobile You

    Unsecured databases represent a huge liability...

  • Break-in at Platinum Leather

    Break-in at Platinum Leather

    Sensitive blueprints can be unwittingly leaked by third parties... An unsecured network storage device is used by a fire detection system contractor to backup the building layouts of its clients. The blueprints expose many weaknesses in the security systems and also disclose a crucial detail: the construction materials and thickness of the peripheral walls.

    This contractor is awarded a contract to equip three warehouses of Platinum Leather, a luxury goods retailer.

Unprotected

  • A hacker is able to identify the storage device and routinely checks the new blueprints. At some point he strikes gold when he realizes that these new warehouses belong to Platinum Leather.

    The hacker easily sells the blueprints on the Dark Web to an organized crime group.

  • That same night, burglars smash stolen SUVs through the walls of all three warehouses, precisely targeting the most vulnerable parts.

    The burglars are able to rob goods worth over one million dollars.

    Repairs to the warehouses and the cost of reinforced security patrols almost double the tab for the retailer.

    The Insurance firms deny coverage, arguing that three warehouses robbed the same night can't be a coincidence and that the attackers must have received insider help.

  • The Head of Operations is currently being investigated by law enforcement.

    The company is on the verge of bankruptcy.

    Nobody has a clue what actually happened!

With CybelAngel

  • CybelAngel continuously sweeps the entire internet for its customer Platinum Leather, based on a number of relevant keywords including the company name.

    The scanning of an unsecured connected device returns a set of blueprints of Platinum Leather's warehouses. Because of the high frequency of these scans, the detection occurs barely minutes after the blueprints were backed up to the drive.

  • A critical-level alert is sent to Platinum Leather's head of security, and CybelAngel cybersecurity analysts start investigating and documenting the source of the leak.

    Remediation procedures are applied as soon as the detailed report comes in: the contractor is notified of the negligence and the backup device is immediately taken offline.

    On the off-chance that the blueprints had been seen by criminals, the Head of Security immediately orders additional patrols on the grounds.

  • Additional construction is ordered to reinforce the weak points of the buildings.

    Beside protecting Platinum Leather, CybelAngel has also likely protected other clients of the negligent contractor!

  • Aborted M&A for Blue Corp

    Aborted M&A for Blue Corp

    Leaked information can kill deals... an M&A advisory firm sets up an FTP storage to share confidential documents, without taking the appropriate measures to restrict access to users or indexing robots.

    Publicly-traded Blue Industry Corp. is approached to discuss a possible merger by their also-publicly-traded direct competitor, who had retained the services of the aforementioned advisory firm.

    As discussions progress, confidential documents such as NDAs, commercial agreements and financial records start to be exchanged - and stored on the FTP server.

Unprotected

  • An investigative journalist is googling a competitor's name for a paper she is writing when she stumbles upon the NDA which has unfortunately been indexed by Google. Intrigued by this NDA between two competitors, she embarks on a mission to find out what's going on.

    Aided by a geeky colleague, the journalist is able to access the full FTP directory structure and unravels the story, finding a bunch of documents that were clearly not meant for public consumption.

  • Several calls for comments are placed to both companies' PR departments, unleashing a crisis.

    The advisory firm is quickly identified as the only possible source of the leak and threats of a lawsuit start to loom.

    The journalist goes public with her information. Both companies deny the claims but the damage is already done.

  • The M&A is cancelled.

    Both companies see their stock collapse before becoming subject to an SEC investigation.

With CybelAngel

  • CybelAngel continuously sweeps the entire internet for its customer Blue Industry Corp. based on a number of relevant keywords, including the company name and certain industry terms and concepts.

    The scanning of an unsecured FTP directory returns a number of confidential documents, all prominently bearing Blue Industry's name. An alert is immediately raised.

  • A critical-level alert is sent to Blue Industry's CISO and Chief Counsel, while the CybelAngel cybersecurity analysts investigate and document the source of the leak.

    Remediation procedures are applied as soon as the detailed report comes in: the advisory firm's head of IT is notified of the unsecured server and proper security is immediately implemented.

  • The M&A goes through as planned, to the benefit of both companies' shareholders!

  • System meltdown at Great Software Ltd

    System meltdown at Great Software Ltd

    Credentials stored as plain text can be lethal... a member of the customer support team at Great Software Ltd publishes a blog post with links to code sample stored on GitHub, to explain how to open a secure VPN channel to a remote system.

    Unfortunately, the code sample contained actual credentials and IP addresses to connect to Great Software Ltd's own production servers.

Unprotected

  • Hackers find the code sample and the credentials stored on GitHub. A quick verification confirms that they are valid.

    The hackers are able to gain a foothold that allows them to access Great Software Ltd's internal networks.

    Hackers exfiltrate Great Software Ltd's customer and employee databases.

  • An Advanced Persistent Threat (APT) is prepared against Great Software Ltd.

    The employee database is sold on Dark Web marketplaces and used for phishing attacks on their personal accounts.

    The carefully crafted APT is triggered just as Great Software Ltd security staff starts to realize something is off. The APT shuts down all cloud and on-premises servers for 5 days.

    The customer database is used to blackmail the company which ends up paying a hefty ransom. The database is released on Dark Web marketplaces anyway and word soon gets out in the press that Great Software Ltd has suffered a massive leak.

  • Customer lawsuits, both related to leaked confidential data and the service disruption caused by the APT, start to pour in.

With CybelAngel

  • CybelAngel continuously sweeps the entire internet for its customer Great Software Ltd based on a number of relevant keywords. Because the company operates a cloud business, these keywords include IP addresses, URLs and domain names.

    The scanning of GitHub returns the code sample containing credentials. A check by a cybersecurity analyst immediately confirms the danger.

  • The CISO of Great Software Ltd is notified.

    The customer support employee edits the code sample to include placeholder credentials. The leaked credentials are modified.

  • Customer support and R&D staff receive security training to become more attuned to risky behavior.

  • GDPR violation for Mobile You

    GDPR violation for Mobile You

    Unsecured databases represent a huge liability... Mobile You is getting ready to launch a new version of its flagship mobile app. To perform real-life tests, the development team had duplicated the entire user database in a cloud-based database engine.

    Deployed in haste, the database was not given a proper authentication system and accepted anonymous connections.

Unprotected

  • Hackers identify the security hole and are able to connect to the backend database.

    The hackers extract Mobile You's entire user database, including login credentials, personal information (name, date of birth, contact information, social security numbers) but also credit card types or PayPal accounts, as well as certain personal preferences that could prove embarrassing if revealed.

  • The stolen database is used to blackmail the company, which initially refuses to pay the ransom.

    In blatant violation of GDPR regulations, Mobile You fails to report the data loss to the proper authorities and to the affected users.

    Part of the database, including information that is embarrassing for certain public figures, is leaked to the tabloid press who dutifully publishes it.

    The EU, in part to make an example, quickly fines Mobile You for GDPR violation.

    A massive scandal is unleashed and, under pressure from public opinion and its insurance firms, Mobile You has no choice but to pay the ransom (which has increased tenfold in the meanwhile).

    The database is released on Dark Web marketplaces anyway.

  • Chunks of Mobile You's database continue to surface here and there and are used for phishing, blackmail and other illegal operations.

    The loss of user trust, the cost of the GDPR fine and the numerous lawsuits, essentially forces Mobile You to shut down its operations.

With CybelAngel

  • CybelAngel continuously sweeps the entire internet for its customer Mobile You based on a number of relevant keywords.

    CybelAngel's scanning of cloud databases identify the unsecured database instance within minutes of its deployment. A quick check by a cybersecurity analyst confirms the danger immediately.

  • Mobile You's CISO and head of R&D are notified.

    IT operations at Mobile You immediately enables proper authentication on the database, closing the security gaps.

  • DevOps processes at Mobile You were revised to ensure developers would not repeat a mistake that could have been lethal for the company.

Select another use case

Back to top

Show me which cyber threats my organization is facing

Bee with cards