Solar Dozor leads investigation: 5 non-standard cases that DLP disclosed

    DLP systems are used to protect confidential company data and identify employees who are merging this data. In most cases, implementation engineers will encounter typical incidents like these on projects. But sometimes the DLP-system unexpectedly detects violations, the detection of which is not even sharpened.

    Under the cut - a selection of the most unusual investigations conducted using DLP.



    Case number 1: "The soldier sleeps, the service goes"


    From the case file: “Company X ordered a pilot implementation of Solar Dozor. Ten employees entered the pilot zone. Endpoint Agent was installed on their computers - a module for controlling user activity on a workstation. ”

    For some reason, the traffic went only from nine computers, the tenth "was silent." We rechecked everything several times, the result is one: the agent is installed, the status is active, the system is working normally, but the traffic is not going. Moreover, according to the ACS, a person comes and goes from work on time, which means that he is exactly in the office.

    Someone joked: “Maybe he's just sleeping there?” They laughed, but decided to check. We were lucky: the CCTV was installed in the office. Here is what we saw: the employee comes to work on time, goes to his office, puts on his sunglasses and ... really sleeps. In the middle of the day, he wakes up on an alarm clock and goes to lunch, communicates with his colleagues, gives instructions, even takes papers for a while and works with contracts, and then returns to himself and works asleep until the end of the working day.

    It turns out that the person at work does not use the computer, so the traffic does not go. Since X is a large organization, without a DLP system in a huge data stream, management did not notice the problem.



    Interestingly, this employee is still working in company X. He himself is not going to leave, and he cannot be dismissed under the article: he comes to work on time, closes the tasks, as he sends them to his subordinates. And it is illegal to use records from cameras of the hidden video surveillance in court: they are established for fire safety, but not for control of employees.

    Case number 2: "Honored Donor"


    When someone sends an electronic certificate or a sick leave to the personnel department, Solar Dozor alerts the security service. The document may be fake, it is better to check.

    From the case file: “An employee of company Y provided a certificate of blood donation in electronic form. When checking, the security officer discovered that the certificate was dated tomorrow: the calendar was Thursday, and the blood was “donated” tomorrow.

    Began investigating the incident. First of all, they checked the authenticity of the data about the clinic and the doctor. It turned out that neither such an organization nor such a specialist exists. It was clear: the certificate is fake. This was confirmed by the analysis of the “donor’s” traffic: the day before he was searching the Internet for where to buy a certificate of blood donation, and placed an order on one of the sites. As the ACS showed, soon after that, he briefly left the office. Perhaps to meet with the courier?

    In addition to data on violations, Solar Dozor keeps a history of employee communications. Interesting information was found in the archive: the “donor” ordered and printed not only a certificate, but also two tickets for a train to a neighboring city, just for the day when “I donated blood”.

    Also found a dialogue employee with his wife. They discussed how great it would be to stroll from work on Friday and go to relatives. Then they had the idea to forge a certificate, because the donor is legally allowed one day off.

    Case number 3: "Sale before theft"


    This case was investigated thanks to the ability of Solar Dozor to analyze the service fields of the photos, which contain data about the device, the date of the survey, geolocation.

    From the case file: “In the company Z, a pilot implementation of Solar Dozor was conducted. Suspicious activity on Avito was recorded from the workstation of one of the employees. ”

    In itself, this is not a crime: a person could look for household appliances, clothing, children's things. Nevertheless, we decided to play it safe: we launched the Dozor File Crawler module and analyzed the contents of the employee’s workstation. Among other things, photographs of electrical boards were found.

    Then the customer remembered that the company had cases of missing shields. Suspicions crept in, but more evidence was needed.

    We found the same photos of shields on Avito, downloaded them and compared service fields. The serial number of the “suspect” phone completely coincided with the model and the serial number in the service fields of the photos. Other data was also identical. This means that the same photos are on the hard disk and on Avito. In the service fields, we looked at geolocation, scored the data in the navigator and found the same shields. As we thought, they were at the facilities of the company Z.

    As it turned out, the employee posted ads for the sale of shields, and when there was a buyer, he carried the equipment. So he managed to sell two shields and got caught on the third attempt.





    Case 4: “Why do you need an antivirus? You are so beautiful


    From the materials of the case: “The system administrator of company B has already come across violations several times, so he fell into the special control group. Solar Dozor tracked all his actions. So his correspondence with the secretary got to the security service. ”


    The girl is not the first time complains that the computer slows down. By correspondence it is clear: we are talking about an antivirus. It is regularly updated or starts checking, because of what the computer starts to freeze. The system administrator, without even trying to solve the problem, simply "blows down" the antivirus. It is evident that he is not doing this for the first time.

    It would seem just negligence, but the consequences are very serious: the car is vulnerable, there is a gap in the perimeter of the company, about which the security man knows nothing.

    Case number 5: Falsification of repair documents


    From the case file: “A is a large organization that deals with the support and repair of power transmission lines, substations and other electrical equipment. There are inspectors in it who go to sites to assess their condition. If there is a problem, they take pictures of it with a service camera and submit a repair request. After that, a contract is formed, a tender is held and money is allocated. ”

    One application caused suspicions. The contracting officer was confident that this section had already been repaired several years ago. We decided to check it out and looked into the service field of the sent photo.



    It turned out that the picture was taken a year ago, the coordinates of the point do not coincide with those indicated in the application, the serial number of the camera also does not correspond to the service one. Most likely, the photo was taken from the Internet and had no relation to real objects. At first glance, such a deception is not easy to see, because all the pillars in the field look the same.



    The information was transferred to the customer’s own security service. During the investigation, it turned out that the same company won the tender over and over again, no repairs were carried out, and the money was simply shared.

    In these cases, there was no cyber attack or confidential information. And yet, thanks to the attention to seemingly insignificant anomalies in the actions of users, it was possible to prevent theft, to detect forgery of documents, to detect unscrupulous employees. So do not ignore the minor oddities reported by the DLP - sometimes they mean nothing less than direct alerts about leaks.

    Also popular now: