Matt Radolec

Engineer, Varonis

Here’s the scenario:

  • An insider was paid to exfiltrate sensitive organizational data
  • To remain uncovered, he takes control on a service account
  • Using the service account, he scans company filers for documents with indicating keywords
  • Copies matching documents to his PC
  • Creates an encrypted ZIP file
  • To remain uncovered, he uses the service account to upload the ZIP file to an external Gmail account 
Our ClIents