Skip to content

Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.

License

Notifications You must be signed in to change notification settings

usrtem/Cyber-Incident-Alert-Breach

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 

Repository files navigation

🚨 Cyber Incident: Alert System Infiltration

Emergency Alert System Breach

This repository documents the simulated breach of a university emergency SMS alert system, infiltrated through credential harvesting and remote access malware. It covers attacker motivations, step-by-step remediation, lessons learned, and updated cybersecurity policies.

πŸ”Š Download narrated presentation (PPTX with audio – OneDrive)


πŸ›‘οΈ Overview

Key Concepts:

  • Social engineering attack vector via remote desktop monitoring
  • Credential reuse and weak authentication exploited
  • Command-and-Control (C2) connection via STEM.EXE
  • Alert system isolation to prevent mass disruption
  • SIEM alert tracking using MAC/IP fingerprinting
  • Containment and policy improvements

πŸ” Key Mitigations

  • Isolated affected alert system to prevent SMS broadcasting
  • Blacklisted STEM.EXE in SIEM
  • Implemented certificate-based authentication (PKI)
  • Clean desk & video call confidentiality policy
  • Gmail phishing report add-in for campus
  • Mandatory annual cybersecurity awareness training

🧰 Tools & Techniques

  • Digital certificates / PKI
  • SIEM investigation (log correlation by MAC/IP)
  • Malware identification and blacklisting
  • Sandbox process analysis (STEM.EXE)
  • Incident response playbook modeling

πŸ‘€ Author

Michael Twining
Cybersecurity Researcher | Blue Team & Incident Response Focus
GitHub: @usrtem
πŸ“« michael.twining@outlook.com
πŸŽ₯ YouTube | πŸ”— LinkedIn


πŸ“œ License

This work is licensed under the Creative Commons Attribution 4.0 International License.

About

Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published