<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Digiss]]></title><description><![CDATA[A repository of insight and Intelligence on  cybersecurity]]></description><link>https://blog.digiss.io</link><image><url>https://substackcdn.com/image/fetch/$s_!lWE4!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38ee6fd9-e01b-42ba-bcc5-0bad1615d3c0_395x395.png</url><title>Digiss</title><link>https://blog.digiss.io</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 17:13:32 GMT</lastBuildDate><atom:link href="https://blog.digiss.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Digiss LLC]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[digissllc@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[digissllc@substack.com]]></itunes:email><itunes:name><![CDATA[Digiss Blog]]></itunes:name></itunes:owner><itunes:author><![CDATA[Digiss Blog]]></itunes:author><googleplay:owner><![CDATA[digissllc@substack.com]]></googleplay:owner><googleplay:email><![CDATA[digissllc@substack.com]]></googleplay:email><googleplay:author><![CDATA[Digiss Blog]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How IKEDC Got Hacked: A Full Breakdown of the ByteToBreach Attack]]></title><description><![CDATA[They Left the Door Open: How ByteToBreach Walked Through IKEDC]]></description><link>https://blog.digiss.io/p/how-ikedc-got-hacked-a-full-breakdown</link><guid isPermaLink="false">https://blog.digiss.io/p/how-ikedc-got-hacked-a-full-breakdown</guid><pubDate>Wed, 06 May 2026 15:49:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!T5Hr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>IKEDC (Ikeja Electric Distribution Company) is one of Nigeria&#8217;s largest electricity distributors, responsible for keeping the lights on across Lagos and its environs. Millions of Nigerians depend on them daily. They handle a staggering volume of sensitive customer and financial data. You&#8217;d think an organization of this scale would have its digital house in order.</p><p style="text-align: justify;">But they don&#8217;t!</p><p style="text-align: justify;">ByteToBreach, a threat actor group that has been on something of a streak lately, added IKEDC to what is becoming an uncomfortably long list of Nigerian enterprises that have been compromised within a short window of time. The pattern is hard to ignore at this point: security controls are either absent, misconfigured, or just plain neglected across a significant number of organizations.</p><p style="text-align: justify;">But enough yapping. Let&#8217;s get the breakdown started.</p><blockquote><p><strong>A quick note for non-technical readers:</strong> cyberattacks don&#8217;t happen in one dramatic moment. They follow a series of deliberate phases &#8212; reconnaissance, gaining a foothold, moving deeper, escalating privileges, and finally, impact. Think of it like a heist movie. The attacker doesn&#8217;t just walk in and open the vault. There&#8217;s planning, there&#8217;s picking locks, there&#8217;s working around the security guard&#8217;s schedule. That&#8217;s exactly what you&#8217;re about to read.</p></blockquote><h2>Phase 1 &#8212; Initial Access: The Unlocked Window</h2><p><strong>Attack Technique: File Upload Bypass &#8594; Remote Code Execution (RCE)</strong></p><p style="text-align: justify;">Every breach has a point of entry. For IKEDC, it was a file upload vulnerability sitting quietly on a subdomain: <code>swims.ikejaelectric.com</code>.</p><p style="text-align: justify;">The application had a mechanism to control which file types users could upload, reasonable in theory. The problem? It trusted a parameter that the <em>user controls</em> to make that decision. That&#8217;s like hiring a bouncer who lets you decide whether you&#8217;re on the guest list.</p><p style="text-align: justify;">By simply modifying that parameter, the attacker added <code>.php</code> to the list of &#8220;allowed&#8221; file types. The server didn&#8217;t flinch. It accepted a malicious PHP file (a <strong>webshell</strong>) saved it in a publicly accessible directory, kept the executable extension intact, and left the door wide open.</p><p style="text-align: justify;">With the webshell uploaded and accessible via browser, the attacker now had the ability to run system commands directly on IKEDC&#8217;s server. That&#8217;s <strong>Remote Code Execution</strong>!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T5Hr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T5Hr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 424w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 848w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 1272w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T5Hr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png" width="1456" height="1156" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1156,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:763627,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!T5Hr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 424w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 848w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 1272w, https://substackcdn.com/image/fetch/$s_!T5Hr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb0bfca0-8596-4c8b-b096-28de210287c1_2507x1990.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 2 &#8212; Establishing a Foothold: Graduating from a Crowbar to a Master Key</h2><p><strong>Attack Technique: Payload Delivery &#8594; C2 Implant (Sliver Framework)</strong></p><p style="text-align: justify;">A webshell works, but it&#8217;s like trying to conduct surgery through a keyhole. Unreliable, limited, and one server restart away from vanishing. The attackers needed something more stable.</p><p style="text-align: justify;">They spun up a simple HTTP server on their own machine and placed a payload they named <code>cloud</code> on it, purpose-built to replace the unstable webshell with something far more capable. Then, through the webshell, they issued a single instruction: fetch it.</p><p style="text-align: justify;">The compromised IKEDC server obediently reached out, downloaded <code>cloud</code>, and executed it. That payload was built call out to the attacker machine instead of waiting for commands to come <em>in</em>, establishing a reverse connection back to the attacker&#8217;s machine. Think of it as the server ringing its new boss and saying, <em>&#8220;I&#8217;m ready. What do you need?&#8221;</em></p><p style="text-align: justify;">To manage this connection, the attackers used <strong>Sliver</strong>, a professional-grade Command and Control (C2) framework. Where the webshell was a screwdriver, Sliver is a full workshop. Stable sessions, persistent access, full command execution, they were now firmly in control.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VdxM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VdxM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 424w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 848w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VdxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png" width="1456" height="877" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:877,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:631869,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VdxM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 424w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 848w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!VdxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c186a0-fa72-44e9-a5ea-ba119d29193b_2489x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 3 &#8212; Internal Reconnaissance: Making Themselves at Home</h2><p style="text-align: justify;"><strong>Attack Technique: Network Share Enumeration, Credential Harvesting, SMB Relay Setup</strong></p><p style="text-align: justify;">With a stable foothold established, the attackers began looking around. Using the <code>SWIMS</code> service account which they now controlled, they scanned an internal server, <code>IKJ-INFSRV13</code>, and immediately struck gold.</p><p style="text-align: justify;">Multiple network shares were sitting there: website backups, security tools, miscellaneous internal data; all with <strong>READ/WRITE</strong> permissions. Not just readable. <em>Writable.</em> On a server that had no business being that permissive.</p><p style="text-align: justify;">But the bigger find? <strong>SMB signing was disabled on the Domain Controller.</strong></p><p style="text-align: justify;">SMB signing is a basic security measure that ensures network communications are cryptographically verified as legitimate. Without it, an attacker can intercept a login attempt mid-flight and replay it against another machine without ever knowing the actual password. It&#8217;s a well-known attack vector and there&#8217;s genuinely no good reason to have it disabled on a domain controller in 2026.</p><p style="text-align: justify;">While that attack was being set up, the attackers also found plaintext credentials sitting in a configuration file; &#8220;<code>config.php&#8221;</code>. No encryption. No hashing. Just a username and password, readable by anyone with access to the file. With those credentials, they could skip the web interface entirely and connect directly to IKEDC&#8217;s databases.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C5qW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C5qW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 424w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 848w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 1272w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C5qW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png" width="1456" height="628" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:628,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:686598,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!C5qW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 424w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 848w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 1272w, https://substackcdn.com/image/fetch/$s_!C5qW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcddb83ed-c556-425a-b85f-1faafbda3679_2489x1073.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 4 &#8212; Privilege Escalation (Attempt 1): The Golden Ticket That Wasn&#8217;t</h2><p style="text-align: justify;"><strong>Attack Technique: ADCS ESC1 Misconfiguration Exploitation (Failed)</strong></p><p style="text-align: justify;">Digging deeper into the internal network, the attackers found something that made them stop and smile: <strong>Active Directory Certificate Services (ADCS)</strong> with an <strong>ESC1 misconfiguration</strong> in a certificate template.</p><p style="text-align: justify;"><strong>For the noobs</strong> &#8212; ADCS is the system that manages digital certificates within a Windows environment. An ESC1 misconfiguration means any low-privileged user can request a certificate and fraudulently claim to be <em>any user on the network</em>, including the Domain Administrator. It&#8217;s not a golden ticket, it <em>is</em> the golden ticket. Instant God-mode, no additional work required.</p><p style="text-align: justify;">There was just one problem.</p><p style="text-align: justify;">The server responsible for issuing that certificate &#8220;<code>EXMBX-11&#8221;</code> was completely unresponsive. Offline. Dead. The vulnerability was real; the target just wasn&#8217;t there.</p><p style="text-align: justify;">The screenshot the attackers shared captures the mood perfectly: <em>&#8220;Dead / decommissioned host... FUCKKKKK!&#8221;</em></p><p style="text-align: justify;">Finding the perfect key is meaningless when the lock it fits cannot be found.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xUlY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xUlY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 424w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 848w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xUlY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png" width="1456" height="592" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:592,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:507898,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xUlY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 424w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 848w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!xUlY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F885c78fd-b17b-41f0-8402-d8a83a3de0fa_2494x1014.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 5 &#8212; Pivoting: When One Door Closes, Find a Another (Unto The Next)</h2><p style="text-align: justify;"><strong>Attack Technique: TUN/Tap Tunneling &#8594; WSO2 RCE (Metasploit)</strong></p><p style="text-align: justify;">A lesser attacker might have packed up at this point. ByteToBreach didn&#8217;t even slow down.</p><p style="text-align: justify;">They deployed <strong>TUN/Tap tunneling</strong> to build a transparent network bridge, essentially a private tunnel that let them browse IKEDC&#8217;s internal systems as if they were sitting at a desk inside the building. With that access, they began exploring.</p><p style="text-align: justify;">And that&#8217;s when they found it: a <strong>WSO2 Enterprise Integrator</strong> server.</p><p style="text-align: justify;">WSO2 is an enterprise middleware platform with a well-documented history of critical vulnerabilities and, crucially, deep Active Directory integration. Finding one on an internal network is the digital equivalent of stumbling across a gold chest with a broken lock.</p><p style="text-align: justify;">No manual exploitation needed. They fired up <strong>Metasploit</strong>, pointed it at the known WSO2 vulnerability, and within moments had a <strong>Meterpreter session</strong> open; a full-featured interactive shell that&#8217;s significantly more capable than anything they&#8217;d had before. New foothold. New network segment. And, as they were about to discover, new credentials.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!muMm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!muMm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 424w, https://substackcdn.com/image/fetch/$s_!muMm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 848w, https://substackcdn.com/image/fetch/$s_!muMm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 1272w, https://substackcdn.com/image/fetch/$s_!muMm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!muMm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png" width="1456" height="1226" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1226,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:881431,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!muMm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 424w, https://substackcdn.com/image/fetch/$s_!muMm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 848w, https://substackcdn.com/image/fetch/$s_!muMm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 1272w, https://substackcdn.com/image/fetch/$s_!muMm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda57059e-d176-4d48-9ee9-42b2125aa307_2494x2100.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 6 &#8212; Credential Harvesting &amp; Privilege Escalation: The Backup Admin Blunder</h2><p><strong>Attack Technique: Cleartext Credential Extraction &#8594; Backup Operators Abuse</strong></p><p>Rooting through the WSO2 server&#8217;s source code and configuration files, the attackers found an <code>application.properties</code> file. Inside it:</p><pre><code><code>Username: backupadmin  
Password: S@lv!f!c2014</code></code></pre><p>Stored in plaintext. In a config file. On a server that had already been compromised.</p><p>They used those credentials to authenticate directly into the domain controller, <code>IKJ-INFSRV13</code>, and ran a quick <code>whoami</code> to see what they were working with. The result was better than expected: the <code>backupadmin</code> account was a member of the <strong>Backup Operators</strong> group.</p><p>This matters more than it sounds. Backup Operators is a Windows group that, by design, can read any file on the system , including files that are normally locked and inaccessible. Including <strong>NTDS.dit;</strong> the Active Directory database that stores the password hashes of <em>every single user in the organization.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z5o6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z5o6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 424w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 848w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 1272w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z5o6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png" width="1456" height="1149" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1149,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:977986,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!z5o6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 424w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 848w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 1272w, https://substackcdn.com/image/fetch/$s_!z5o6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16343e96-824e-46f9-bfab-e449010574c2_2503x1976.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 7 &#8212; Domain Compromise: Total Control</h2><p><strong>Attack Technique: Registry Hive Extraction &#8594; Pass-the-Hash &#8594; BloodHound Confirmation</strong></p><p style="text-align: justify;">The domain controller had one last defensive card to play: it blocked standard remote command execution (RPC calls). A minor inconvenience for someone holding Backup Operator privileges.</p><p style="text-align: justify;">The attackers simply leveraged those privileges to pull three critical registry hives directly off the domain controller; <strong>SAM, SYSTEM, and SECURITY</strong>. These three files, combined, contain the NTLM password hash for the Administrator account &#8212; the highest-privileged user on the entire network.</p><p style="text-align: justify;">With that hash, they didn&#8217;t need the actual password. They ran a <strong>Pass-the-Hash</strong> attack, using the hash itself as the authentication credential against multiple servers: <code>IKJ-INFSRV13</code>, <code>IKJ-INFSRV17</code>. Both fell.</p><p style="text-align: justify;">To confirm the full scope of what they now controlled, they ran <strong>BloodHound</strong>; a tool that maps Active Directory relationships and attack paths. The result was unambiguous: they had <strong>Domain Admin</strong>. Full, unrestricted control over the entire Active Directory environment. Every password changeable. Every file accessible. Every machine in scope.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ac7d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ac7d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 424w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 848w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 1272w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ac7d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png" width="1456" height="1108" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1108,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1324154,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ac7d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 424w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 848w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 1272w, https://substackcdn.com/image/fetch/$s_!ac7d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a127a07-7d4b-4d79-a4d0-46c8aa0fbeff_2496x1900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 8 &#8212; Targeting the Lifeline: Destroying the Ability to Recover</h2><p style="text-align: justify;"><strong>Attack Technique: vCenter Authentication Bypass &#8594; Veeam Credential Extraction</strong></p><p style="text-align: justify;">Domain Admin is powerful, but smart attackers think about what happens <em>after</em> the ransomware hits. If the victim has clean backups, they restore, recover, and move on, no ransom paid. So before deploying anything destructive, the attackers went after the backup infrastructure first.</p><p style="text-align: justify;">Their path led them to <strong>vCenter</strong>: VMware&#8217;s management platform for the company&#8217;s virtualized server infrastructure. vCenter operated on a separate authentication system, so Domain Admin credentials didn&#8217;t work directly. Didn&#8217;t matter. They exploited a known vulnerability involving a malformed file, bypassed the login screen entirely, and walked straight into the management console for IKEDC&#8217;s entire virtual environment.</p><p style="text-align: justify;">What they found inside was almost funny, if it weren&#8217;t so alarming: pirated software running on the company&#8217;s most critical servers, and zero endpoint security tools. No antivirus. No EDR. Nothing. The attackers simply whitelisted their own malware and settled in. At this point they had the power to delete IKEDC&#8217;s entire digital existence with a handful of commands.</p><p style="text-align: justify;">But vCenter controls the <em>live</em> servers. The backups live somewhere else.</p><p style="text-align: justify;">That somewhere else was <strong>Veeam</strong>; the platform managing IKEDC&#8217;s backup and recovery operations. The attackers remotely queried the Veeam backup server&#8217;s database and extracted stored credentials. Veeam had stored service account passwords insecurely, making it trivial to decrypt and read them in cleartext, including the credentials for the <strong>virtualization administrator</strong>.</p><p style="text-align: justify;">With those credentials, they logged into the Veeam management console.</p><p style="text-align: justify;"><strong>15 terabytes</strong> of company data sprawled out in front of them. Email servers. Primary databases. Every backup, catalogued and mapped. They now knew exactly where every copy of IKEDC&#8217;s data lived and they had the access to delete all of it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!50gL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!50gL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 424w, https://substackcdn.com/image/fetch/$s_!50gL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 848w, https://substackcdn.com/image/fetch/$s_!50gL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 1272w, https://substackcdn.com/image/fetch/$s_!50gL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!50gL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png" width="1456" height="1206" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1206,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1238697,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!50gL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 424w, https://substackcdn.com/image/fetch/$s_!50gL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 848w, https://substackcdn.com/image/fetch/$s_!50gL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 1272w, https://substackcdn.com/image/fetch/$s_!50gL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f198b5-ee30-4e35-a631-a100f93117e4_2501x2072.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Game Over</h2><p>This is the point in the attack chain where leverage becomes absolute. With control over both the live virtual infrastructure via vCenter <em>and</em> every backup via Veeam, any ransomware deployment would be irreversible. No restoring from backups. No walking it back. Pay, or lose everything.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ce4h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ce4h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 424w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 848w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 1272w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ce4h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png" width="1456" height="1177" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1177,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1008962,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ph4r40h.substack.com/i/195968073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ce4h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 424w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 848w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 1272w, https://substackcdn.com/image/fetch/$s_!ce4h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F371bc723-07ab-4900-b217-d028e3fdda19_2501x2022.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>None of these individual failures were unavoidable. Each one was a decision or rather, a failure to make one. Proper input validation. Signed SMB traffic. Encrypted credential storage. Patched and decommissioned servers removed from the network. Any one of these controls, in the right place, changes the outcome of this story.</p><h3>Okay, So How Do You Not Be IKEDC?</h3><p style="text-align: justify;"><em>I am tired. I have to get to work this morning. My eyes hurt. But I started this and I will finish it because apparently I hate myself a little bit.</em></p><p style="text-align: justify;">Here&#8217;s the thing; this breach wasn&#8217;t the result of some next-level, nation-state, zero-day wizardry. This was a greatest hits compilation of security failures that have been documented, warned about, and screamed into the void by security professionals for <em>years.</em> So let&#8217;s do a quick breakdown of what could have stopped this at each stage, because somebody at IKEDC clearly wasn&#8217;t reading the memos.</p><p style="text-align: justify;"><strong>Validate your file uploads properly.</strong> The whole attack started because the server let a user-controlled parameter decide what files were acceptable. Your server should be making that decision, not the person uploading the file. Whitelist allowed types server-side, strip executable extensions, and for the love of everything, don&#8217;t save uploaded files in a publicly accessible directory.</p><p style="text-align: justify;"><strong>Enable SMB signing on your domain controllers.</strong> There is no legitimate reason it should be off. None. It costs you nothing and it closes the door on an entire category of relay attacks. Just turn it on.</p><p style="text-align: justify;"><strong>Stop storing plaintext credentials in config files.</strong> If you are putting a username and password in a <code>.php</code> or <code>.properties</code> file and not encrypting it, you are not a company, you are a treasure chest with a sticky note on it that says &#8220;open me.&#8221; Use a secrets manager. Vault, AWS Secrets Manager, even environment variables with proper access controls, anything is better than plaintext in a file that any compromised process can read.</p><p style="text-align: justify;"><strong>Audit your privileged groups.</strong> The <code>backupadmin</code> account being in Backup Operators and having access to the domain controller was probably something nobody thought about twice. That account was likely created years ago for a specific task and then forgotten but its permissions weren&#8217;t. Regularly review who has what access. If a service account doesn&#8217;t need elevated privileges to do its job, strip them.</p><p style="text-align: justify;"><strong>Patch your software. Please.</strong> The WSO2 exploit used here was a <em>known</em> vulnerability. Metasploit had a module for it. That means it was public, documented, and exploitable by anyone with a search engine and 20 minutes. There is no excuse for running unpatched enterprise middleware on your internal network.</p><p style="text-align: justify;"><strong>And if you&#8217;re running pirated software on your most critical servers</strong> &#8212; I don&#8217;t even know what to say to you.</p><p style="text-align: justify;"><strong>Test your backups, then protect them like they&#8217;re the only thing standing between you and chaos</strong> because they are. Veeam storing credentials insecurely and being reachable from a compromised host essentially handed the attackers the keys to the last room in the house. Backup systems should be isolated, access should be tightly controlled, and credentials should never be stored in a way that can be trivially decrypted.</p><p style="text-align: justify;">No organization is perfectly secure, and nobody expects IKEDC to have a SOC that rivals a Fortune 500 company. But there&#8217;s a significant gap between &#8220;not perfect&#8221; and &#8220;leaving every window open with a sign that says please rob us.&#8221; Most of what failed here was basic. Foundational. The kind of stuff that security frameworks have been recommending since before people like me were in secondary school.</p><p style="text-align: justify;">The cost of a breach financially, reputationally, operationally will always dwarf the cost of fixing these things before someone else finds them. Always.</p><p style="text-align: justify;">Alright. I&#8217;m going to work. Stay safe out there. Patch your systems.<br>I&#8217;ll also like to know your thoughts regarding this breach : )</p>]]></content:encoded></item><item><title><![CDATA[From Checklists to Continuous Compliance: How AI Is Transforming GRC]]></title><description><![CDATA[AI is turning Governance, Risk, and Compliance from a backward-looking audit exercise into a real-time, intelligence-driven function that keeps pace with the actual threat landscape.]]></description><link>https://blog.digiss.io/p/from-checklists-to-continuous-compliance</link><guid isPermaLink="false">https://blog.digiss.io/p/from-checklists-to-continuous-compliance</guid><dc:creator><![CDATA[Digiss Blog]]></dc:creator><pubDate>Wed, 06 May 2026 15:44:50 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="3100" height="1744" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1744,&quot;width&quot;:3100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Someone is writing on a tablet with a stylus.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Someone is writing on a tablet with a stylus." title="Someone is writing on a tablet with a stylus." srcset="https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1748609523112-da78cb7210a2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzfHxjaGVja2xpc3R8ZW58MHx8fHwxNzc4MDIzNTY1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jakubzerdzicki">Jakub &#379;erdzicki</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>For decades, Governance, Risk, and Compliance &#8212; GRC &#8212; has been one of the most resource-intensive and least glamorous corners of cybersecurity. While penetration testers and threat hunters operate at the sharp edge of the discipline, GRC teams have largely toiled in spreadsheets, email chains, and audit portals, manually gathering evidence, maintaining risk registers, and preparing for assessments that happen once a year whether the organization is ready or not. AI is now rewriting this reality, turning GRC from a backward-looking compliance exercise into a forward-looking, continuously operating risk intelligence function.</p><h2>The Traditional GRC Model: Built for a Slower World</h2><p>To appreciate the magnitude of this shift, it is worth understanding just how manual and fragmented traditional GRC has always been. The discipline spans four interconnected domains &#8212; risk management, compliance, policy management, and third-party risk &#8212; and in the traditional model, each one suffered from the same structural flaw: it was designed to produce a point-in-time snapshot rather than continuous situational awareness.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Digiss! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>Risk Management: Static Registers and Annual Reviews</h2><p>In the traditional model, risk management began with the construction of a risk register &#8212; a document listing known risks, their likelihood, their potential impact, and the controls in place to mitigate them. These registers were built through workshops and interviews, populated by hand, and reviewed on a quarterly or annual basis. By the time a risk register was finalized and approved, the threat landscape it was designed to reflect had already changed.</p><p>The deeper problem was that traditional risk registers were disconnected from real-world threat intelligence. A risk might be rated &#8220;medium&#8221; based on someone&#8217;s subjective judgment in a workshop two quarters ago, with no mechanism to automatically escalate it when a new exploit targeting that exact exposure was published the following week. Risk scores were opinions, not signals.</p><h2>Compliance Management: The Annual Audit Treadmill</h2><p>Compliance management in the traditional model was built around a single event: the audit. Whether the framework in question was SOC 2, ISO 27001, PCI DSS, HIPAA, or NIST, the pattern was the same. An assessment date was set, teams scrambled to gather evidence &#8212; screenshots, configuration exports, policy documents, access logs &#8212; from dozens of systems across the organization, and much of this evidence collection was done manually, with staff chasing down system owners over email and compiling artifacts into shared folders for auditors to review.</p><p></p><p>This process was exhausting, expensive, and produced a result that was only meaningful for a brief window of time. An organization could achieve SOC 2 Type II certification in January and suffer a significant control failure in February, with no mechanism to detect or report it until the next assessment cycle rolled around.</p><h2>Policy and Control Management: A Documentation Exercise</h2><p>Policies and controls were documented in Word files and SharePoint libraries, updated infrequently, and rarely tested against actual operational reality. Control owners were assigned on paper, but whether those controls were being executed consistently in practice was largely a matter of trust and manual spot-checking. Gaps between documented controls and operational reality could persist for months without detection.</p><h2>Third-Party Risk: Questionnaires and Hope</h2><p>Third-party risk management was perhaps the weakest link in the traditional GRC model. Organizations sent lengthy security questionnaires to vendors, waited weeks for responses, reviewed answers subjectively, and filed the results away. Whether a vendor&#8217;s security posture had deteriorated since they last completed a questionnaire was essentially unknown until the next assessment cycle, or until a breach occurred.</p><p>The limitations of traditional GRC were not the result of a lack of effort or expertise. They were structural. The volume of data required to manage risk and compliance accurately simply exceeded what any human team could process manually and continuously. AI removes that constraint entirely.</p><h2>Continuous Risk Monitoring and Dynamic Scoring</h2><p>AI-powered GRC platforms have replaced the static risk register with a continuously updated risk intelligence model. Rather than relying on subjective workshop outputs, these platforms ingest data from vulnerability scanners, threat intelligence feeds, endpoint detection systems, cloud configuration tools, and external attack surface monitoring services, synthesizing it all into dynamic risk scores that reflect the current state of the environment.</p><p>When a new critical vulnerability is disclosed, the platform automatically assesses whether any assets in scope are affected, correlates that exposure with known exploit activity in the wild, and escalates the associated risk items in real time. Risk scores are no longer opinions formed in a workshop. They are living signals derived from actual data, updated continuously as the environment and the threat landscape evolve.</p><h2>Automated Evidence Collection and Continuous Compliance</h2><p>Perhaps the most transformative AI contribution to GRC is in compliance management. AI-powered platforms now integrate directly with cloud environments, identity providers, endpoint management systems, and SaaS applications to collect compliance evidence automatically and continuously. Rather than scrambling to pull screenshots before an audit, organizations maintain a living, always-current evidence repository that maps directly to the controls required by their applicable frameworks.</p><p>This shift has profound implications. Instead of achieving compliance once a year and hoping nothing breaks before the next audit, organizations can monitor their compliance posture in real time. Control failures are detected immediately, not discovered by an auditor months later. The gap between documented controls and operational reality collapses because the platform is observing operational reality directly, not relying on self-reported data.</p><h2>AI-Driven Policy Intelligence</h2><p>AI is also transforming how organizations manage and apply policies. Natural language processing now enables GRC platforms to map policy requirements automatically to technical controls, identify gaps between policy intent and implemented configurations, and flag when system changes introduce policy violations. Policies are no longer static documents that gather dust between reviews. They become active inputs into a continuous monitoring process that verifies compliance with them in practice, not just on paper.</p><h2>Intelligent Third-Party Risk Management</h2><p>The transformation of third-party risk management is particularly striking. AI-powered platforms now assess vendor security posture continuously using external signals &#8212; open port scanning, certificate monitoring, dark web exposure data, breach history, and security rating feeds &#8212; without relying on self-reported questionnaire responses. Organizations gain a real-time view of how their vendor ecosystem&#8217;s risk profile is changing, and can set automated alerts when a key vendor&#8217;s security rating drops below an acceptable threshold. The questionnaire does not disappear entirely, but it is no longer the primary signal.</p><p>60%</p><p><strong>Of breaches involve a third party</strong> Yet traditional vendor risk management relied almost entirely on self-reported questionnaire data reviewed annually. AI-powered continuous monitoring closes this gap with real-time external signals.</p><h2>From Reporting to Prediction</h2><p>Perhaps the most forward-looking capability AI brings to GRC is predictive risk analytics. By analyzing historical risk and control data alongside external threat intelligence, AI models can now identify which controls are most likely to fail, which business units carry the highest concentration of unmitigated risk, and where the next significant exposure is most likely to emerge. GRC leadership can shift from reporting on what has already happened to advising the business on what is likely to happen next &#8212; a transformation from a compliance function to a genuine strategic risk intelligence capability.</p><h2>A New Role for GRC Professionals</h2><p>It is worth addressing a concern that often arises in this conversation: whether AI is replacing GRC professionals. The answer is clearly no, but the role is evolving significantly. The GRC professional of the near future will spend far less time on manual evidence collection, questionnaire management, and spreadsheet maintenance, and far more time on risk interpretation, control strategy, and business-facing risk communication. AI handles the data gathering and pattern recognition. Human judgment remains essential for deciding what the data means and what to do about it.</p><h2>The Bottom Line</h2><p>Traditional GRC was built for an era when annual audits and quarterly risk reviews were considered sufficient. In a threat landscape where material changes to an organization&#8217;s risk posture can occur overnight, that cadence is no longer defensible. AI transforms GRC from a compliance calendar into a continuous risk intelligence operation &#8212; one that monitors the environment in real time, detects control failures the moment they occur, and gives leadership the forward-looking insight they need to make informed decisions. The checklist is not gone. But for the first time, the checklist actually keeps up with reality.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Digiss! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Penetration Testing in the Age of AI: Faster, Smarter, and Always On]]></title><description><![CDATA[How artificial intelligence is compressing four-week engagements into days, slashing costs by 75%, and transforming pentesting from a compliance checkbox into a continuous discipline.]]></description><link>https://blog.digiss.io/p/penetration-testing-in-the-age-of</link><guid isPermaLink="false">https://blog.digiss.io/p/penetration-testing-in-the-age-of</guid><dc:creator><![CDATA[Digiss Blog]]></dc:creator><pubDate>Wed, 06 May 2026 15:40:54 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="4024" height="2688" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2688,&quot;width&quot;:4024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;flat screen computer monitor displaying white and black screen&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="flat screen computer monitor displaying white and black screen" title="flat screen computer monitor displaying white and black screen" srcset="https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTc3ODA4MjAwNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@kommumikation">Mika Baumeister</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>For years, penetration testing has occupied a peculiar place in the cybersecurity landscape. Everyone agrees it is essential. Everyone knows it should happen more often. And yet, for the vast majority of organizations, it remains an infrequent, expensive, and painstaking exercise &#8212; conducted once a year, driven more by compliance deadlines than genuine security conviction. AI is about to change all of that, fundamentally and permanently.</p><blockquote><h2>The Traditional Engagement: A Four-Week Journey</h2></blockquote><p>To understand how significant this shift is, it helps to walk through what a traditional penetration testing engagement actually looks like. The process follows a structured six-step flow that, end to end, typically consumes at least four weeks of calendar time.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Digiss! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w4cS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w4cS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w4cS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg" width="713" height="616.7931034482758" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:577,&quot;width&quot;:667,&quot;resizeWidth&quot;:713,&quot;bytes&quot;:175030,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://katen230205.substack.com/i/195777969?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!w4cS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w4cS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa24d6a1-f851-484b-a56c-affc9ddfad40_667x577.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><h2>Kick-Off Call</h2></blockquote><p>Every engagement begins with a Kick-Off Call &#8212; a scoping session where the client and testing team align on objectives, rules of engagement, systems in scope, and any constraints or sensitivities. Necessary as it is, this phase alone can take days of back-and-forth scheduling and documentation before a single test is run.</p><blockquote><h2>Attack Surface Analysis</h2></blockquote><p>From there, the team moves into Attack Surface Analysis &#8212; a methodical process of mapping the target environment, identifying externally exposed assets, cataloguing services, reviewing architecture, and building a picture of how an attacker might approach the target. This reconnaissance phase demands significant manual effort and experienced judgment.</p><blockquote><h2>Vulnerability Discovery</h2></blockquote><p>Vulnerability Discovery follows, where testers use a combination of automated scanning tools and manual techniques to surface weaknesses across the attack surface. But unlike a simple vulnerability scan, penetration testers go further &#8212; attempting to understand how discovered weaknesses chain together and which ones represent genuine, exploitable risk.</p><blockquote><h2>Penetration Testing</h2></blockquote><p>The heart of the engagement is the Penetration Testing phase itself &#8212; active exploitation where testers attempt to breach systems, escalate privileges, move laterally, and demonstrate the real-world impact of discovered vulnerabilities. This is the most skilled, time-intensive phase, often consuming the better part of two weeks for a complex environment.</p><blockquote><h2>Report on Findings</h2></blockquote><p>Once testing is complete, the team compiles a comprehensive Report on Findings &#8212; a document covering project scope, assumptions and constraints, a summary of major findings, strategic recommendations for limiting exposure, technical descriptions of each vulnerability, the anatomy of exploitation or penetration achieved, technical and business risk assessments, and prioritized remediation recommendations. Writing a report of this quality takes days.</p><blockquote><h2>Close-Out Call</h2></blockquote><p>The engagement closes with a Close-Out Call, where findings are walked through with the client team, questions are answered, and next steps are agreed upon.</p><p>Six phases. Four weeks minimum. Significant cost. And when it is over, the organization is left with a snapshot of their security posture &#8212; accurate on the day the report was written, but aging by the hour.</p><blockquote><h2>What AI Changes &#8212; and How Dramatically</h2></blockquote><p>AI does not just accelerate a few steps in this process. It compresses the entire engagement timeline by at least 75%, turning a four-week exercise into something achievable in days.</p><p>During the Attack Surface Analysis phase, AI-powered tools can autonomously map an organization&#8217;s exposed assets, enumerate services, and build a comprehensive picture of the attack surface in hours rather than days. Machine learning models trained on offensive security methodologies identify patterns and relationships in the data that would take a human analyst significantly longer to uncover.</p><p>Vulnerability Discovery is where AI delivers its most dramatic improvement. Modern AI agents do not simply scan for known CVEs. They actively reason about the target environment, identify chained weaknesses, and prioritize findings based on real-world exploitability rather than theoretical severity scores. Findings are validated, contextualized, and tied to real kill chains, eliminating the false positives that waste analyst time.</p><p>The Penetration Testing phase itself &#8212; traditionally the most labor-intensive &#8212; is being transformed by agentic AI systems capable of executing complex offensive workflows autonomously. Agent orchestration, swarm architectures, and inter-agent communication protocols can now replicate the sophisticated decision-making that previously required senior human testers. Critically, AI does not stop after finding one viable route into a system. It continues exploring every available attack path simultaneously, producing a far more complete picture of risk.</p><div class="callout-block" data-callout="true"><p>75% <strong>Reduction in engagement time</strong> AI-powered penetration testing compresses what traditionally took four weeks into a matter of days, with a corresponding reduction in cost that makes the service significantly more accessible.</p></div><p>Reporting, too, benefits enormously. AI can generate structured, detailed findings reports in a fraction of the time it takes a human analyst to write from scratch, automatically mapping vulnerabilities to business risk, suggesting remediation priorities, and structuring output in formats immediately useful to both technical and executive audiences.</p><blockquote><h2>From Point-in-Time to Always On</h2></blockquote><p>Perhaps the most profound shift AI enables is not speed &#8212; it is continuity. For decades, penetration testing has been a point-in-time exercise. An organization might pass their annual test in January, then spend the following twelve months in the dark as their environment changes, new assets come online, new vulnerabilities are disclosed, and new attack techniques emerge. The compliance checkbox is ticked, but genuine security insight evaporates almost immediately.</p><div class="callout-block" data-callout="true"><p>AI-powered platforms are built around a fundamentally different philosophy. Rather than a once-a-year engagement, organizations get a persistent offensive simulation environment &#8212; essentially a permanent red team operating around the clock, every day of the year.</p></div><p>Platforms like <a href="https://www.armadin.com/">Armadin</a> are at the forefront of this shift. Founded by Kevin Mandia &#8212; the cybersecurity leader who built Mandiant &#8212; Armadin raised nearly $190 million to build an agentic AI platform that deploys a swarm of specialized AI agents trained on decades of real-world red team methodology. These agents plan, reason, adapt, and attempt real exploitation paths rather than merely identifying theoretical vulnerabilities, chaining weaknesses across identity systems, applications, infrastructure, and cloud configurations continuously.</p><p>This shift has enormous implications for how organizations think about their security posture. Instead of asking &#8220;were we secure enough to pass our annual test?&#8221;, they can ask &#8220;are we secure right now, today?&#8221; and get a real answer. Daily situational awareness replaces the quarterly or annual snapshot that was previously the best most organizations could hope for.</p><blockquote><h2>Better Security at a Lower Cost</h2></blockquote><p>When AI reduces the time and cost of a penetration testing engagement by 75%, the economics of the service change fundamentally. Penetration testing stops being a luxury reserved for large enterprises with generous security budgets and becomes something any organization can access routinely. The penetration testing market is projected to grow from $1.98 billion in 2025 to $4.39 billion by 2031, driven precisely by this democratization.</p><p>Organizations that previously ran a single annual test because of cost constraints can now run continuous assessments. Those motivated purely by compliance can discover that continuous testing provides something compliance never could: genuine, real-time confidence in their defenses.</p><blockquote><h2>The Bottom Line</h2></blockquote><p>The four-week, high-cost, once-a-year penetration testing engagement is not disappearing &#8212; but it is being fundamentally redefined. AI compresses timelines, eliminates false positives, explores more attack paths, and generates better reporting. More importantly, it transforms penetration testing from a periodic compliance ritual into a continuous, intelligence-driven practice that mirrors the pace of the real threat environment.</p><p>Organizations that embrace this shift will not just save time and money. They will finally have the kind of continuous, honest picture of their defenses that good security has always demanded &#8212; and that only AI can now realistically deliver.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Scanners to Smart Systems: The Evolution of Vulnerability Management]]></title><description><![CDATA[How AI and machine learning are transforming the four-phase vulnerability lifecycle from a slow, reactive discipline into a continuous, intelligent defense that operates at the speed of modern threats]]></description><link>https://blog.digiss.io/p/from-scanners-to-smart-systems-the</link><guid isPermaLink="false">https://blog.digiss.io/p/from-scanners-to-smart-systems-the</guid><dc:creator><![CDATA[Digiss Blog]]></dc:creator><pubDate>Wed, 06 May 2026 15:36:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pFpv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8024dc5e-d01c-46d1-8be2-5934285140ad_1024x608.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8024dc5e-d01c-46d1-8be2-5934285140ad_1024x608.webp&quot;}],&quot;caption&quot;:&quot;&quot;,&quot;alt&quot;:&quot;From Scanners to Smart Systems: The Evolution of Vulnerability Management&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/webp&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8024dc5e-d01c-46d1-8be2-5934285140ad_1024x608.webp&quot;}},&quot;isEditorNode&quot;:true}"></div><p></p><p>In the ever-shifting battlefield of cybersecurity, vulnerability management has always been one of the most critical disciplines in a security team&#8217;s arsenal. The core objective has never changed: find weaknesses before attackers do, fix them, and confirm they are gone. But the methods, tools, and speed at which this work happens have undergone a seismic transformation. What once took security teams weeks of painstaking manual effort can now be accomplished in hours and, in some cases, autonomously. To appreciate how far we have come, it helps to understand where we started.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>The Traditional Vulnerability Management Lifecycle</strong></h2><p>For much of the past two decades, vulnerability management followed a structured but sluggish four-phase cycle: discover, analyze, remediate, and verify. Each phase was heavily dependent on human effort, scheduled tooling, and inter-team coordination, a combination that introduced significant delays at every turn.</p><p>Thanks for reading! Subscribe for free to receive new posts and support my work.</p><h2><strong>Discovery: Scanners and Vendor Advisories</strong></h2><p>The process began with discovery. Security teams deployed network and host-based scanning tools such as Nessus, Qualys, and OpenVAS to sweep IT environments for known vulnerabilities. These scans were typically scheduled weekly, bi-weekly, or even monthly, depending on the organization&#8217;s resources and risk appetite. Between scan windows, newly disclosed vulnerabilities went undetected, leaving organizations blind to emerging threats for days or weeks at a time.</p><p>Alongside scanners, teams also monitored vendor advisory channels. When Microsoft released its Patch Tuesday updates, or when Cisco, Oracle, or Red Hat published security bulletins, analysts would manually review each advisory, cross-reference affected products in their environment, and flag relevant issues for action. This was time-consuming, reactive work that depended heavily on individual analysts staying on top of a relentless stream of disclosures.</p><h2><strong>Analysis: Manual Triage and Prioritization</strong></h2><p>Once vulnerabilities were identified, the next challenge was figuring out which ones actually mattered. Security teams leaned on the Common Vulnerability Scoring System (CVSS) to assess severity, but CVSS scores alone were a blunt instrument. A critical-rated vulnerability on a system with no internet exposure might pose far less risk than a medium-rated flaw on a publicly accessible server handling sensitive data.</p><p>This contextual analysis was largely manual. Analysts had to correlate vulnerability data with asset inventories, network topology, and business criticality, often working across disconnected spreadsheets and ticketing systems. The result was a slow, inconsistent prioritization process where the most dangerous vulnerabilities did not always rise to the top fast enough.</p><h2><strong>Remediation: Patching and Configuration Changes</strong></h2><p>With a prioritized list in hand, security teams handed off remediation tasks to IT operations. Patches needed to be tested before deployment to avoid breaking production systems. Change management processes required approvals. Maintenance windows had to be scheduled. For large enterprises managing thousands of assets across distributed environments, this coordination overhead was enormous.</p><p>The 2017 Equifax breach, one of the most damaging in history, resulted from a vulnerability that had been publicly disclosed and patched 78 days before it was exploited. The patch simply was not applied in time.</p><h2><strong>Verification: Confirming the Fix</strong></h2><p>The final phase, verification, was often the most overlooked. After remediation, teams needed to confirm that the fix had actually worked. This typically meant running another manual scan, reviewing results, and closing out tickets. In busy environments, this step was sometimes skipped entirely, leaving teams falsely confident that vulnerabilities had been resolved when they had not.</p><p>Taken together, the traditional vulnerability management lifecycle was reactive, labor-intensive, and structurally slow. It was designed for a threat landscape that no longer exists.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J9MC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J9MC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J9MC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg" width="711" height="563.8965517241379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:529,&quot;width&quot;:667,&quot;resizeWidth&quot;:711,&quot;bytes&quot;:134407,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.digiss.io/i/196671432?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J9MC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!J9MC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d4fa673-1467-4b03-b53b-0c0626ece2c2_667x529.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2><strong>How AI Has Transformed Vulnerability Management</strong></h2><p>The emergence of AI and machine learning has fundamentally reimagined every phase of this process, not by replacing human judgment entirely, but by dramatically augmenting it with speed, scale, and intelligence that no manual process can match.</p><h2><strong>Smarter, Continuous Discovery</strong></h2><p>AI-powered platforms have eliminated the concept of scheduled scans. Modern tools continuously monitor environments in real time, detecting new assets as they come online, identifying configuration changes, and flagging vulnerabilities the moment they are disclosed. Integrated threat intelligence feeds allow these platforms to correlate newly published CVEs against an organization&#8217;s specific asset inventory automatically, so no analyst needs to read through vendor bulletins line by line. Discovery is now a living, breathing process rather than a periodic snapshot.</p><h2><strong>Intelligent, Context-Aware Analysis</strong></h2><p>Where traditional analysis relied on CVSS scores and manual judgment, AI brings a far more sophisticated approach to prioritization. Machine learning models ingest data from multiple sources simultaneously &#8212; threat intelligence feeds, active exploit databases, asset criticality ratings, network exposure data, and historical attack patterns &#8212; to generate dynamic risk scores that reflect real-world danger rather than theoretical severity. Vulnerabilities being actively exploited in the wild are automatically elevated. Those affecting isolated, low-value assets are deprioritized. The result is a focused, actionable list that directs human attention where it matters most.</p><h2><strong>Accelerated, Guided Remediation</strong></h2><p>AI has also transformed how organizations respond to vulnerabilities. Intelligent platforms now generate context-aware remediation recommendations, suggesting the most effective fix for each vulnerability based on the specific environment. In some cases, AI-driven automation handles routine patches entirely autonomously, without requiring human intervention. For more complex or high-risk changes, AI prepares detailed remediation playbooks that reduce the cognitive burden on operations teams and accelerate execution. What once took weeks of back-and-forth coordination can now be resolved in hours.</p><h2><strong>Automated Verification</strong></h2><p>Perhaps the most underappreciated AI contribution is in verification. Automated systems now validate remediation outcomes in near real time, continuously re-evaluating the environment after changes are made and confirming that vulnerabilities have been fully resolved. This removes the risk of fixes being assumed rather than confirmed, and it closes the feedback loop far faster than any manual rescan could.</p><p><strong>Days between patch release and the Equifax breach</strong> A defining failure of the traditional vulnerability management model, and a cautionary reminder of what delayed remediation costs in the real world.</p><h2><strong>A New Standard for Cyber Resilience</strong></h2><p>The evolution of vulnerability management is ultimately a story about keeping pace with adversaries. Attackers today are fast, automated, and opportunistic. They scan the internet for vulnerable systems within hours of a new CVE being published. The traditional vulnerability management cycle, with its weekly scans and multi-week remediation timelines, was never built to compete with that reality.</p><p>AI has closed the gap. By transforming vulnerability management from a periodic, reactive process into a continuous, intelligent defense, organizations can now operate at the speed the modern threat landscape demands. The tools have changed. The timelines have changed. And for security teams willing to embrace this evolution, the outcome is a meaningfully stronger security posture across the board</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.digiss.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>