Blog | Threat Intelligence Brief


Extensive Remote Workforce and Upcoming American Holiday Likely to Attract Significant Increase in Ransomware Attacks


Since May 4th, we have seen an eye-catching increase in cyber incidents, email compromise, and ransomware attacks.

As we approach the US Holiday, Memorial Day, we expect this increase to continue. To help improve your awareness, we offer the following trends and fairly consistent indicators pointing back to Eastern European and Russian criminal actors.


Here are some of the prevalent trends that we have seen recently:

  • Attackers are using compromised admin credentials. The credentials appear to be coming from successful phishing attacks, or brute forcing/guessing. In at least one case we worked, a laptop appeared to be infected with password-harvesting malware—when an administrator remotely logged in, the attackers were able to collect the admin credentials.
  • Organizations with open ports on 3389 and 21 seem to be especially susceptible to attack.
  • Domain controllers are being encrypted, making deployment of recovery tools difficult. We strongly recommend having good backups of domain controllers.


We are sharing the following recommendations, in order of importance, based on recent research and incidents we’ve worked throughout May:

  • Mandate multifactor authentication (MFA), wherever possible. Even if an attacker can obtain login credentials (password and user name), MFA is very effective at deterring full compromise.
  • Implement advanced endpoint protection, such as CrowdStrike. Traditional antivirus is increasingly becoming less effective (as evidenced by the AV server getting encrypted in a cited case).
  • Use complex passwords for admin accounts, especially those shared with outside vendors.

Network Monitoring 

The knowledge we gain through our Incident Response Practice, often gets “re-invested” into PacketWatch as alerts and queries watching for anomalous trends and threats.

Following is a PacketWatch graph showing activity for the past week from Russian IP addresses. This activity is collected via an externally-facing PacketWatch node not filtered by a firewall, affording us tremendous visibility into the holistic nature of internet traffic.

As you’ll notice in the following graph, Russian activity last week noticeably spiked starting around 00:30 AM HRS on Friday, May 15, and subsided the following Tuesday morning.



When we break this traffic out by Autonomous System Number (ASN), we see that two ASN’s seem to be primarily responsible for this increase in traffic. Please see the following graph.



We traditionally see a surge in cyber attacks on or around major American holidays, since attackers are keen to exploit victims they suspect may be less vigilant due to vacations, remote work, or the typical excitement and distractions that accompany holiday activities.

Lately, the surge in attack traffic appears to be focused on ports 445, 23, and 3389 (SMB, Telnet, and RDP, respectively). These ports are typical threat vectors for wormable exploits and ransomware deployment. Based on the timing in this swell of activity as well as the targeted ports, we assess with moderate to high confidence that organizations with services open and responding on these ports may face significant targeting over the coming Memorial Day weekend.

Russian Activity Over the Past Seven Days

Looking at Russian activity over the past week, we also see a fair amount of other traffic looking for interesting services such as Secure Shell (port 22, SSH) and port 5900. Port 5900 is associated with Apple’s remote network computing. Database administrators will be interested to see 1433, SQL, makes an appearance here as well.

About PacketWatch

We are threat hunters, investigators, intelligence analysts, and cybersecurity experts with experience in federal law enforcement, national security, and enterprise IT. Leveraging our expertise and our innovative use of technology, we help our clients find security risks that others may miss.

Please visit us at

Investigating Cybersecurity Incidents using Full Packet Capture

Investigating Cybersecurity Incidents using Full Packet Capture

Blog | Presentation

Investigating Cybersecurity Incidents using Full Packet Capture

Cybersecurity Incident Response requires technical expertise, the right tools, and a trained investigative eye. On Monday, January 6th, Michael McAndrews, our Vice President of Network Security Services and former FBI Special Agent, walked the audience at the Southwest CyberSec Forum through the process we used to investigate and resolve a recent international cybersecurity incident.

The PacketWatch incident response team used a combination of full packet capture, forensic collection tools, and CrowdStrike Falcon EDR technologies to identify abnormal host activity and malicious network traffic. Analyzing packet-level data over time helps uncover anomalous activity that is often missed by traditional toolsets. This PacketWatch case study described the plan we executed, highlighting the need for advanced incident response tools to mitigate and eradicate the malicious activity.

There was a strong turnout for the CrowdStrike-sponsored event held at the University of Advanced Technology (UAT) theater in Tempe. One of the attendees shared his thoughts after seeing Michael’s presentation:

“Michael’s story was fascinating. It really hits home when you see shades of your own organization in security incidents like the one he described. Most IT departments would have to deploy an assortment of tools to gather the kind of granular information collected by PacketWatch. This case study showed how having access to both historical and active network data in a single platform enabled responders to achieve successful mitigation quickly. Without the visual analysis of network patterns provided by PacketWatch, doing this level of investigation would be daunting.”

You can watch Michael’s presentation “The Need for Advanced Incident Response Tools and Capabilities” on the Southwest CyberSec Forum YouTube page (43 min).

Michael regularly educates cybersecurity professionals at events, forums, and national conferences. If you would like him to talk with your audience or need help investigating an incident, please Contact Us.

“Michael’s story was fascinating. It really hits home when you see shades of your own organization in security incidents like the one he described.”