Case Study
Case Study
network and test if these weaknesses could be exploited. They engaged CSW to replicate an attack on their network
15000 endpoints. Our goal for this engagement was to test their security controls and see if we could bypass them.
It was a challenging objective because their infrastructure was spread across two continents.
CSW’s pentesters use a unique blend of manual and automated processes to discover vulnerabilities that could be
exploited. The vulnerabilities are then prioritized based on the threats they pose, the value of the asset, and the
impact of the breach. We then validate each vulnerability by mimicking a threat actor’s stealth attack methods. Our
pentesters use tactics, techniques, and procedures (TTPs) used by Advanced Persistent Threats (APTs) to penetrate
We deliver our findings through a near real-time platform using which the client could see our progress and interact
with our pentesters during the engagement. The platform is intuitive in nature and provides synchronized delivery of
with RCE
The client is an auto parts manufacturer located in the USA and China. A global supplier to
international automakers, their customers represent 80% of the auto market share in the world.
HOW WE HELPED A GLOBAL AUTO PARTS MANUFACTURING COMPANY BY TESTING THEIR SECURITY POSTURE? 1
CHALLENGE
We discovered many unique vulnerabilities in the client’s external network, and many were extremely critical with
remote code execution capability. CSW team used anti-virus evading tools and malicious scripts to bypass the
system but our attempts were unsuccessful as the client had an AI-based anti-virus system that was effectively
We discovered 15000+ endpoints across 60+ subnets in the internal network. We identified over 360+ vulnerabilities,
of which 55 were critical. Many of these unique vulnerabilities had RCE capabilities and insecure passwords etc. that
We were able to bypass the system and create a local user without administrator’s privileges.
We found that many systems used the same credentials that enabled the pentester easy access to
Using compromised credentials, we were able to access the backup data of over 50+ hosts.
We could also access their MongoDB without authentication and see their sensitive data.
We used exploit tools to test their IP cameras and reset the password and gain control over it.
While testing, we also found evidence of Ryuk ransomware attack in the past.
IMPACT
Our team was able to read configurations (including account passwords), access the CC TV camera images
We got access to their storage systems which had their entire data.
We were able to get full access to their SCADA configurations and control supervisory and data acquisition
Our team was able to move through the network and identify, intrude, and exfiltrate valuable data. We were
able to gain access to a low-privileged asset -, a host machine at the manufacturing plant in China through
which we acquired privileges to move between devices and applications in the network, and gained access
We were able to successfully demonstrate how a threat actor could penetrate the customer’s defenses, gain control
over their proprietary data, spy on their manufacturing plant and shut down their production.
Compromise & access customer’s CCTV camera Access their storage systems
HOW WE HELPED A GLOBAL AUTO PARTS MANUFACTURING COMPANY BY TESTING THEIR SECURITY POSTURE? 2
ATT&CK MITRE MAPPED
Initial Internal Remote Valid
Access Services Accounts
Exploitation for
Execution chief Execution
Commend Remote
and control Access
Software
Exfiltration
Exfiltration Over Network
Medium
Account Data Distruction Data Encrypte Defacement Disk Wipe End Point Network
Impact Access For Impact
Removal
CONCLUSION
CSW’s pentesters were able to provide proof of concept by penetrating through the defenses of the customer.
Through this engagement, we were able to test their existing security controls and show them how they could be
At the end of the engagement, the client got a comprehensive remediation guide and recommendations from our
team. The client found value in the extensive support and guidance provided by CSW during their remediation. They
have since engaged us to conduct annual penetration tests of all their assets and infrastructure.
Visit our website www.cybersecurityworks.com for more information about our services or reach out to us at
[email protected].