accent 1 accent 2
Cyber Attack Lab #2

Detecting & Investigating Insider Threats

Friday January 22nd | 9:00 am EST

Watch a disgruntled software engineer go rogue!


In a devious attempt to steal sensitive financial info, our insider finds a list of service accounts with admin privileges, performs a Kerberoasting attack to hijack a backup service's credentials, and sends a ZIP full of sensitive info to a personal Gmail account.


We'll show you how the attack is performed and what the corresponding alerts look like in Varonis.

+1 CPE

Register Now

About this webinar:

See how Varonis uncovers indicators of compromise at every turn.

  • An insider was paid to exfiltrate sensitive organizational data
  • To cover his tracks, he takes control of a service account with elevated privileges
  • Using the service account, he scans company file shares for documents with certain keywords
  • Copies matching documents to his PC
  • Creates an encrypted ZIP file
  • He uses the service account to exfiltrate the ZIP file as an attachment to a personal Gmail account
Ryan OBoyle
Ryan O'Boyle Security Analytics Manager, Varonis

Ryan O’Boyle, GCIH is a Team Lead for the Incident Response and Security Architecture team at Varonis. Ryan has an engineering background with experience in IT infrastructure, Incident Response, and Data Protection. Varonis’ team of security professionals provide complementary Incident Response services to all existing customers. In addition, they work with customers to operationalize the Varonis Data Security Platform and integrate Varonis into the security ecosystem.

“In terms of solutions, Varonis Edge was our MVP. Edge directed us to the computers with suspicious DNS requests, correlated them with specific users, and showed us the addresses we needed to block.” 

Want to see Varonis in action?