B. Excerpt2: Windows SecurityLog
Event ICY4.776
Source: Microsoft-Windows-Security-Auditing
Timestamp: 2024-04-12 10:14:56 AM
Computer: EHR-SERVER0l
User: JSmith
Domain: HOSPITALDOMAIN
Workstation: NURSESTATION4
Source Network Address: 10.5.15.87
C. Excerpt3: Windows SystemLog
EventlD:6009
Source: Microsoft-Windows-Kernel-General
Timestamp: 2024-04-1111:59:58 PM
Detail: The system has rebooted without cleanly shutting down first.
D. Excerpt4: IIS Logs(The provider usesa web-basedsystem)
Timestamp: 2024..:04-1201:26:41 AM
Client IP; 213. 75.22.80
Method: POST
URI Stem: /patientrecords/access.php?id=5551212
Status: 500 (Server Error)
Question8: Threat Intelligence
CaseStudy:"Operation Golden Hook"
A targeted phishing campaign has hit a multinational corporation specialising in
technology and manufacturing. Key observations: -
1. Sophistication- Emails are exceptionally well-crafted spear-phishing attempts.
They mimic internal communications and reference current projects, spoofing
sender addresses of high-level executives.
2. Payload - Initial analysis suggests a previously unknown malware variant
designed to steal intellectual property and exfiltrate sensitive research and
development files.
3. Victimology - Attackers focused on engineers and research staff. In the past
year, competitors have shown increased interest in the corporation's products
and patents.
Page 4