Spoiling a cyberattack on a mining company

September 2024 Information Security


Armand Kruger.

NEC XON recently demonstrated its cybersecurity capabilities by thwarting a potential ransomware attack targeting a major mining group. The incident began when NEC XON's xCTEM (Extended Continuous Threat Exposure Management) platform identified that credentials for a privileged account, capable of accessing remote services such as VPN, were being sold by an Initial Access Broker (IAB).

These credentials were likely to be purchased by ransomware operators known for human-operated ransomware attacks, posing a significant threat to the mining firm's operations.

The response

Upon receiving this intelligence, NEC XON's Managed Detection & Response (MDR) team immediately assessed the overall business risk associated with the compromised account. The team determined the potential impact if ransomware operators gained access to the mining firm's environment. To mitigate the risk, NEC XON quickly implemented several measures:

● Password change: The password for the compromised privileged account was changed to a more complex passphrase.

● Multi-factor authentication (MFA): MFA was enabled for the account to add an additional layer of security.

● Risk-based controls: Additional controls were applied, including restricting the account to log in only from certain devices and locations.

Two days after NEC XON’s proactive response to limit the identified risk and protect the privileged identity, VPN login attempts were detected from IP addresses linked to the Maze ransomware group, using the privileged identity.

These attempts were blocked, preventing any unauthorised access. This incident underscores the importance of NEC XON's proactive measures, which not only detected, but also prevented a potentially devastating ransomware attack.

The benefits

The benefits of NEC XON's intervention were multifaceted. The xCTEM platform's early warning capabilities enabled NEC XON to alert the mining firm about the potential threat before the compromised credentials could be exploited. This proactive approach ensured the security of the firm's systems, preventing data breaches and operational disruptions. Additionally, NEC XON's deployment of advanced AI-driven technologies underscores their commitment to pioneering a more predictive and proactive cybersecurity strategy, thereby enhancing overall resilience against cyber threats.

"Our extensive knowledge of adversarial tactics, how threat actors operate, and how they form part of the modern digital cyber ecosystem enables us to facilitate proactive response measures to ensure effective incident response outcomes,” says Armand Kruger, Head of Cyber Security, NEC XON.

NEC XON's proactive cybersecurity measures, not only minimised the risk of disruption to the mining firm's operations, but also maximised sustainability. Their approach ensures that data breaches and cyberthreats are addressed swiftly, protecting the business from significant losses.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.