Scope of the pentest
During this assessment, our ethical hackers simulate and analyse an attack by an an employee (and their device).
The test can be conducted on premises or remotely.
Exemplary test objects:
Network shares
We check which access permissions are set for network shares.
Privilege Escalation
We check, how far a regular employee may escalate their access within the network and their workstation.
Active Directory
We evaluate, how a low privileged domain user may attack your Active Directory environment.
In 2020 mutiple large companies, such as Twitter, Amazon or Shopify became victims of insider attackers. More than two thirds of companies admit they would be vulnerable to attacks from the inside. ²
An average attack by an insider is discovered after 77 days. ²
Almost a third of reported offenses can be traced back to actions of employees. ¹
Evil Employee
Our approach
Cyber attacks are constituting an increasing risk, which organizations have to counter wordwide. Many companies are focusing on external attackers, to protect against remotely exploitable vulnerabilities and breaches. External attacks are considered a high risk and are thus prioritized in defense.
However, a 2014/2015 cyber security survey “WIK/ASW Enquete 2014/2015” has identified that almost a third of reported breaches are attributable to actions by employees. The number of undisclosed employee incidents remains unknown. These internal risks are frequently disregarded in risk assessments, even though they can constitute the highest risk potential for an organization.
During our evil employee assessment, we analyze how far an employee with a regular company-notebook and access to the internal IT network can escalate their privileges to exfiltrate data without permission. Would it be possible to retrieve sensitive data without permission? During our test, we focus on areas like patch management, sensitive data on file shares or registry configuration
After we finish the assessment, we show vulnerabilities and possible countermeasures in a presentation to increase the security of your devices against internal threats.