How to Avoid Contagious Third-Party Compromises with Prevailion

Compronise Resolution header image
3 March 2020

The following story is based on a third-party compromise that occurred in December 2019. Customer names and titles have been changed to ensure their privacy.

Todd, a risk management director at a communications organization, was relieved the first time he used Prevailion and saw that his immediate network was green — clean of active cyber compromise. Seeing that all-clear sign from Prevailion was reassuring, because it validated the existing security measures that he had enacted to secure his network. 

But trouble was brewing just on the other side of his organization’s door. 

Beyond monitoring his company’s IP addresses, Todd is using Prevailion to continually monitor his large ecosystem of third parties, including vendors, suppliers and partners. After Todd dug a little deeper, he discovered that a trusted third-party organization had an active compromise lurking that could jeopardize Todd’s own infrastructure by “island hopping” through their linked connections. It was only a matter of time before his partner’s compromise became his own, threatening his customers’ valuable data and proprietary information. 


My Partner is Compromised—Now What?

Todd reached out to Prevailion for guidance on what he saw as an active cyber compromise in his partner’s network — something that could ultimately affect his network. Prevailion’s intelligence team confirmed the issue, and with Todd’s help, agreed to connect with the partner’s head of IT to bring the security flaw to their attention. 

The next step can be tricky. No one wants to hear about an unseen problem lurking in their network, and they certainly don’t want to hear about it from an organization they’re unfamiliar with. But Todd’s story demonstrates how banding together to combat compromises in a proactive, communal way can benefit all parties. That’s why it’s important to break through the inertia around inter-organizational relationships to counteract the advanced nation-state adversaries of today.

“Our contact with the organization was through the head of IT, and he was uncomfortable and unsure about us at the beginning of the call,” said Adam Flatley, VP of Prevailion’s Tailored Intelligence Team. “But after I walked him through who we were, how we target bad actors on the Internet to discover compromise activity, and the depth of our compromise intelligence, that relaxed him significantly.”

Adam is a veteran with properly delivering a victim notification. Having served 15 years with the Department of Defense and two years at Cisco’s Talos Intelligence Group, he’s seen the impact of threat actors on a global scale across the networks of nation-states, businesses, and individuals. 

After Adam oriented the head of IT to the compromise Todd had witnessed on Prevailion’s platform, a glimmer of recognition was heard in the man’s voice.

“Oh, yeah! I thought I took care of that back in November,” he said, alluding to the removal of malware on a machine in his network — software that was programmed to prop a door open and infiltrate or exfiltrate data. What he didn’t know at the time is that the compromise had silently persisted. It likely would have gone unchecked for a significant period of time before being rediscovered, leading to untold damages. 

While Prevailion does not perform the incident response on-site, the company will supply the evidence of compromise to the affected party. This documentation of the malicious activity was supplied to the head of IT, which was enough information for him to close the loop entirely on his end.

Not long afterward, Todd checked Prevailion’s Apex platform and confirmed that the affected organization is no longer compromised — and it all started when he expanded his compromise visibility just beyond his organization’s network. 


See a Breakdown of a Third-Party Breach


Do I Need to Worry About MY Third-Party Connections?

Yes. A compromised third-party vector, like the story above documented, is how Target’s point-of-sale systems were breached in 2013. This breach resulted in one of the largest credit-card scandals in history, affecting 40 million customers and accounting for more than $220 million in damages to the company over the ensuing years.

Prevailion is a next-generation intelligence company that monitors billions of active, malicious beacons all around the world. That is a step beyond the indicators of compromise that are at the core of most security solutions. 

If Prevailion sees something, it’s not just an indicator of a compromised network, it’s evidence of compromise.

Register for free access to the Prevailion Apex Platform to check for threat actor activity in your organization.Sign up to schedule a personalized, live demo of the world’s first zero-touch Compromise Intelligence™ platform.

Prevailion empowers organizations to make profitable decisions using confirmed Evidence of Compromise.
Request a Demo or a Free Account to see the Apex Platform™ first-hand.

The Latest

Prevailion CEO, Karim Hijazi – Cheddar News- FCC commissioner calls on Apple and Google to ban TikTok app

A member of the FCC renewed urgency calls on Apple and Google to remove TikTok from their app stores, raising concerns that TikTok’s Chinese-based parent company is collecting user data that is being accessed in China.

IRONSCALES Cyber Security Heroes: The New Cyber Era Post Ukraine Invasion

What Wicked Webs We Un-weave

What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.