Operational Handoff
- Shift window: 2026-03-30 through 2026-04-03
- Cases investigated: 15
- Pending ARIA action: 15 cases — urgency breakdown: immediate: 15 | within_shift: 0 | next_available: 0
- On hold: 0 cases pending additional telemetry
- Watch list: srv-ad-01.corp.local and srv-db-staging.corp.local each appear in multiple confirmed compromises across this shift — ARIA should treat both as priority isolation targets and assume lateral movement scope is wider than any individual case documents.
Investigation Overview
Fifteen cases investigated across the shift window. Every case resulted in ESCALATE_TO_ARIA.
- Verdicts: ESCALATE_TO_ARIA: 15 | CLOSED: 0 | HOLD: 0
- Root cause confidence: CONFIRMED: 10 | PROBABLE: 5
- TORA hypothesis resolution: CONFIRMED: 3 | REFINED: 12 | REFUTED: 0
- Alert type:
dns_malicious_lookup: 15 (all cases) - Threat families confirmed or probable: QakBot/TA570 (3 cases), BlackCat/ALPHV (6 cases), Cobalt Strike (3 cases), Sliver (1 case), Metasploit (1 case), IcedID-attributed infrastructure (1 case)
- Assets confirmed or probably compromised:
srv-ad-01.corp.local,srv-db-staging.corp.local,ws-fin-015.corp.local,10.10.6.200(unnamed VM, multiple cases), plus lateral movement destinations across 14 named or IP-addressed secondary hosts
What TORA Handed Off
The escalation queue I received this shift was dense, specific, and weighted toward the most severe end of the alert taxonomy. All 15 cases were dns_malicious_lookup alerts, and the asset profile skewed heavily toward crown-jewel-adjacent and high-criticality production systems: the Active Directory server srv-ad-01.corp.local, the staging database server srv-db-staging.corp.local, a production finance workstation (ws-fin-015.corp.local), and a recurring unregistered VM at 10.10.6.200 that appeared across multiple cases without hostname, owner, or OS metadata. Threat intel context was generally strong — domains like secure-vault-exfil.com (55/60 sources, BlackCat) and dist-pkg-repo.net (29/60 sources, QakBot) arrived with credible corroboration, and most of TORA’s hypotheses were well-formed enough to adopt as working hypotheses rather than requiring reconstruction.
The overall quality of TORA’s handoffs was good at the hypothesis level but uneven in a specific recurring respect: TORA’s identity attribution consistently surfaced the active session user from alert-layer context rather than the process-level execution account visible in EDR telemetry. In three separate cases (VERA-20260331-0005, VERA-20260331-0006, VERA-20260331-0009), TORA named an elevated-privilege user as the primary threat actor, and investigation found the malicious processes running under a different service account entirely — svc_monitor, ctaylor, and alee respectively. This is a structural enrichment gap, not a triage failure: TORA does not have process-user context at triage time. But it created a recurring refinement burden at T2 and, more importantly, consistently left the actual execution identity underspecified in the containment framing TORA passed to me.
Six of the fifteen cases were ssh_bruteforce_c2_dns-correlated — alerts where a confirmed SSH brute-force success preceded the malicious DNS query on the same host, triggering TORA’s forced-escalation rule. These cases required significantly more investigation depth than standard DNS lookup cases. Where a standard dns_malicious_lookup escalation typically requires me to confirm or refute C2 activity and scope from DNS, process, and netflow signals, the SSH-correlated cases demanded parallel kill-chain reconstruction: validating the brute-force timestamp, identifying the compromised credential, reconciling EDR activity against the authentication timeline, and determining whether the SSH event was the actual initial access vector or a correlated-but-separate signal. In three of the six SSH cases (VERA-20260330-0002, VERA-20260331-0005, VERA-20260403-0021), EDR telemetry showed malicious process execution predating the confirmed SSH success — a timeline anomaly that substantially complicates attribution and cannot be resolved through standard DNS-triage logic. The evidence complexity in these cases was materially higher, and the investigation packages were correspondingly richer, with 15–20 timeline events versus the 6–8 events typical in cases with thinner telemetry coverage.
What the Investigations Found
TORA-20260330-0002 / VERA-20260330-0002 — Domain controller compromise, QakBot, full kill chain confirmed
TORA escalated this under the ssh_bruteforce_confirmed_access forced rule: external IP 185.56.83.83 (RU-attributed, AS57523) brute-forced SSH into srv-ad-01.corp.local and 75 minutes later the host resolved dist-pkg-repo.net, a known QakBot C2 domain. TORA’s hypothesis was confirmed in full, and lateral movement — which TORA assessed as plausible — was confirmed to two internal hosts (WEB-436 at 172.16.0.145 and an unnamed host at 192.168.10.126). The investigation surfaced two timeline anomalies worth documenting. First, EDR process execution events — specifically C:\Users\Public\svchost.exe spawning C:\Temp\rundll32.exe — and file staging artifacts predated the confirmed SSH success timestamp by up to 54 minutes, which either indicates a separate undetected initial access vector or clock skew between EDR and the authentication log source. Second, a privilege escalation event under m.reyes at 17:10:58Z predated SSH success at 17:35:00Z by 25 minutes, which TORA noted as a dual-IP infrastructure anomaly but which I assessed as a SIEM correlation artifact combined with probable prior compromise activity. The active C2 connections (153.99.47.212:4444 and 115.212.153.143:80), confirmed file staging in C:\Temp, C:\ProgramData, and C:\Users\Public, and a process chain of rogue svchost.exe → rundll32.exe → bash and python3 constitute the richest single-case evidence set this shift. The MITRE techniques confirmed span T1110.001, T1071.001, T1059.005, T1036.005, T1021.002, T1078, and T1068 — seven confirmed across a single case, which is the breadth indicative of a mature, multi-stage intrusion rather than a simple beacon.
TORA-20260330-0003 / VERA-20260330-0003 — Finance workstation, BlackCat, REFINED on account identity and DNS discrepancy
TORA’s hypothesis — BlackCat ransomware staging or active C2 across at least four corporate assets, with ws-fin-015.corp.local as the trigger host under admin-privileged user a.patel — was confirmed in direction but refined on three points. The triggering DNS query for secure-vault-exfil.com returned NXDOMAIN in network flow DNS history, contradicting the NOERROR recorded in the IDS alert. C2 contact was confirmed not via the flagged domain but through a subsequent outbound TCP/443 connection to 5.30.237.62 at 19:58Z, approximately 37 minutes post-query — an IP not in the known BlackCat infrastructure profile at triage time. Additionally, the execution chain ran under service account svc_backup, not a.patel’s admin session: a masqueraded lsass.exe at C:\Users\Public\lsass.exe spawned netcat from C:\Windows\Temp\nc under svc_backup at 19:19Z. The a.patel account showed lateral credential activity — account_switch events from two distinct internal IPs — consistent with credential reuse rather than direct interactive execution on ws-fin-015. This is the clearest example this shift of TORA’s alert-layer identity attribution diverging from EDR process-layer reality, and the containment scope required expansion to address both the service account and the admin credential separately.
TORA-20260331-0006 / VERA-20260331-0006 — Staging DB server, Cobalt Strike, identity misattribution and lateral movement to high-criticality asset
TORA’s hypothesis named m.reyes as the elevated-privilege user driving Cobalt Strike beacon execution on srv-db-staging.corp.local. Investigation found the beacon process running under ctaylor, with m.reyes appearing in anomalous authentication events consistent with pass-the-hash relay — meaning LSASS credential harvesting had already occurred and m.reyes was a harvested identity in active use, not the execution account. This distinction matters for containment: ctaylor’s session was the operational context requiring isolation, while m.reyes’s credentials required revocation enterprise-wide. The confirmation of lateral movement to FILE-197 (10.10.5.204, high criticality) via port 135 at 17:19Z — which TORA could not confirm — elevated the blast radius assessment materially. DNS history also revealed three additional cdn-*-assets.net domains (cdn-236-assets.net, cdn-638-assets.net, cdn-533-assets.net) queried as early as 05:05Z, roughly ten hours before the triggering alert, establishing that the detection fired on a trailing indicator while earlier-stage activity went undetected for the full working day. The correlated LSASS Memory Access (IDS-865458) and Suspicious PowerShell Execution (IDS-911223) alerts on the same host within the investigation window form a coherent post-exploitation timeline consistent with Cobalt Strike’s documented TTP sequence.
TORA-20260402-0016 / VERA-20260402-0016 — Unnamed VM, Sliver, most unexpected finding this shift
This case was the most unexpected finding of the shift. TORA escalated at medium confidence (62%) and P2 priority, framing 10.10.6.200 as a plausible first-beacon event for a Sliver C2 implant against an asset with no metadata. What the investigation confirmed was substantially more advanced: not a first-beacon event but an active multi-stage post-exploitation operation that had already progressed through persistence installation, C2 channel establishment to 48.134.187.71:139, and lateral movement to both a high-criticality host (172.16.0.252) and a domain controller (DC-676 at 10.10.2.199) via WMI. The severity was escalated from TORA’s high to critical specifically because of the domain controller lateral movement — a finding that carries organization-wide credential compromise implications. The DNS query for update-check-ms.net returned NXDOMAIN in network telemetry despite TORA recording NOERROR from the IDS, but an active external TCP connection to a separate IP confirmed C2 was live regardless of DNS resolution status. An MFA-authenticated account_switch to ctaylor at 13:49:51Z — 14 minutes before the DNS event — indicates the attacker established a session before C2 activation, and the C:\ProgramData\winlogon.exe implant predating the telemetry window suggests the initial foothold predates the entire investigation package. The threat_actor_profile block for Sliver was flagged available: true but contained entirely empty TTP arrays, which degraded investigation quality throughout and represents a knowledge base gap, not a data collection gap.
VERA-20260403-0021 / TORA-20260402-0021 — Staging DB server, BlackCat, pre-success execution under unknown account
This is the SSH-correlated case that most clearly illustrates the pattern I flagged across this investigation class. TORA confirmed SSH brute-force success for attacker 91.92.251.103 (NL) via the backup account at 20:22:00Z, with the C2 DNS query for secure-vault-exfil.com following. Investigation confirmed the core hypothesis but found that wscript.exe executing from C:\ProgramData\ under user jsmith — an account not in any TORA indicator list, not in the brute-force username roster, and without any authentication log record — was already running at 20:11:36Z, ten minutes before confirmed SSH success. This pattern — malicious EDR activity predating the brute-force success timestamp that triggers forced escalation — appeared in three SSH-correlated cases across the shift. The implication is that the ssh_bruteforce_confirmed_access forced-escalation rule is firing on a trailing indicator while an earlier-stage access event, potentially via a separate vector, is occurring on the same host without generating a detection. Additionally, a critical-severity SMB Lateral Movement alert (IDS-931655) was closed 67 minutes before confirmed initial access on this host — a prior alert closure pattern that preceded confirmed compromise and warrants cross-case examination.
Where Confidence Hit Its Ceiling
Five cases closed at PROBABLE rather than CONFIRMED, and the reasons cluster into three distinct patterns rather than five independent gaps.
The first pattern is absent EDR on high-criticality assets. VERA-20260402-0019 (BlackCat on srv-ad-01.corp.local) and VERA-20260401-0013 (IcedID-attributed activity on the same host) both reached PROBABLE because srv-ad-01 has no EDR deployed. In both cases, network flow and authentication log evidence was sufficient to confirm active lateral movement and suspicious domain queries, but process-level root cause — the mechanism of compromise, persistence artifacts, and kill chain — could not be confirmed without endpoint telemetry. What makes this particularly consequential is that srv-ad-01.corp.local is the highest-value target in this environment for both ransomware and credential-harvesting campaigns. The structural coverage gap is worst precisely where process-level visibility is most needed.
The second pattern is absent netflow data, which capped C2 channel confirmation in VERA-20260402-0018 (Cobalt Strike on 10.10.6.200) and VERA-20260402-0020 (BlackCat on ws-fin-015.corp.local). In both cases, EDR evidence confirmed staging behavior and process masquerading, but without netflow I could not establish whether an outbound C2 connection was completed. The PROBABLE disposition reflects that gap, not any contradicting evidence. In VERA-20260402-0020 specifically, all three primary investigation sources — EDR, netflow, and authentication logs — were simultaneously absent, leaving a production finance host with confirmed SSH compromise and NOERROR C2 domain resolution entirely uninvestigated at the process level. That is the maximum-severity telemetry absence scenario, and it produced a case where PROBABLE is functionally indistinguishable from CONFIRMED in containment terms but cannot formally be called CONFIRMED.
The third pattern appeared in VERA-20260401-0012 (Cobalt Strike on VM 10.10.6.200): complete asset metadata absence combined with missing EDR and netflow. This asset carried zero CMDB entries — no hostname, criticality, environment, owner, OS, or network segment. The investigation reached PROBABLE based on DNS signal, threat intel, and a single corroborating authentication log event (a successful admin privilege escalation 3 minutes and 43 seconds post-DNS-query from a distinct internal IP). Pushing that case to CONFIRMED would have required EDR to confirm an implant and netflow to confirm an established C2 channel — both unavailable. The auth log finding is genuinely strong corroboration, but without process-level evidence the standard for CONFIRMED cannot be met.
Patterns Across Cases
Several signals recurred across enough cases this shift to constitute observable patterns rather than coincidences, and I want to document them explicitly because they only become visible at T2 across the case corpus.
The most prevalent pattern is the IDS-versus-netflow DNS response code discrepancy. In at least seven cases this shift, the IDS-normalized alert recorded NOERROR for the triggering DNS query while the network flow DNS history for the same host and approximate timestamp recorded NXDOMAIN. This appeared in VERA-20260330-0003 (secure-vault-exfil.com), VERA-20260331-0009 (same domain, srv-db-staging), VERA-20260401-0013 (delivery-track-api.com), VERA-20260402-0016 (update-check-ms.net), VERA-20260402-0018 (telemetry-cloud-api.com), VERA-20260403-0024 (fonts-static-cdn.net), and VERA-20260403-0025 (secure-vault-exfil.com). In none of these cases did the discrepancy change the escalation verdict, because independent endpoint and network evidence confirmed compromise regardless of DNS resolution status. But the pattern matters for TORA’s triage logic: NOERROR is a meaningful false-positive reduction signal in TORA’s response_code_analysis step, and if the IDS layer is systematically misreading or normalizing response codes that raw netflow records as NXDOMAIN, that step is operating on unreliable input. The discrepancy may reflect a resolver-layer artifact, a sensor placement difference, or a normalization defect in the IDS alert pipeline — determining which requires NOVA-level cross-case analysis.
The second pattern is EDR activity predating the alert trigger event in SSH-correlated cases. In VERA-20260330-0002, process execution predated SSH success by up to 54 minutes. In VERA-20260331-0005, the ncat binary was running 53 minutes before the C2 DNS query. In VERA-20260403-0021, wscript.exe under jsmith was active 10 minutes before confirmed SSH success. The ssh_bruteforce_confirmed_access forced-escalation rule fires when brute-force success is confirmed — but the pattern of pre-success EDR activity across these cases suggests the detection is consistently triggering on a trailing indicator while earlier-stage access via a separate vector is occurring without generating a detection upstream. If this pattern holds across the broader case corpus, there is a detection gap at an earlier kill-chain stage that the current brute-force detection architecture does not surface.
The third pattern is the identity misattribution at the alert layer. TORA’s triage correctly surfaces the active session user as the primary identity of interest, but in VERA-20260331-0005 (execution under svc_monitor), VERA-20260331-0006 (execution under ctaylor while m.reyes was flagged), VERA-20260331-0009 (execution under alee while m.reyes was flagged), and VERA-20260403-0021 (execution under jsmith while backup was the SSH credential), the process-level execution account differed from the alert-layer identity every time. The containment implication is real: in each case, acting only on the flagged identity would have left the actual execution account active. The service account identification gap is the most operationally consequential variant — IDS-DNS alerts triggered by a session user do not surface running-process account context, and service accounts executing malware underneath a legitimate user session are currently invisible to TORA’s enrichment at triage time.
The fourth pattern is the prior alert closure preceding confirmed compromise. In VERA-20260403-0021, a critical-severity SMB Lateral Movement Detected alert (IDS-931655) was closed 67 minutes before confirmed initial access on the same host. In VERA-20260402-0019, an Unusual Outbound HTTPS Volume alert was escalated 40 minutes before the C2 DNS query on srv-ad-01. In VERA-20260403-0025, a LSASS Memory Access alert (IDS-732959) was closed during the active compromise window. Across this shift, the pattern of closed or resolved prior alerts appearing in the context of cases that later resulted in confirmed compromise appeared in at least four investigations. These closures may represent legitimate triage decisions on individually ambiguous signals, but their recurrence in confirmed-compromise cases suggests a possible threshold calibration issue at T1.
For NOVA
The following signals appeared across three or more cases and require cross-case analysis. I am surfacing them here as NOVA’s primary input from this shift.
The IDS/netflow DNS response code discrepancy is the highest-priority systemic signal. It appeared in at least seven cases — VERA-20260330-0003, VERA-20260331-0009, VERA-20260401-0013, VERA-20260402-0016, VERA-20260402-0018, VERA-20260403-0024, and VERA-20260403-0025 — in each case with the IDS recording NOERROR and netflow DNS history recording NXDOMAIN for the same host and query. NOVA should determine whether this discrepancy is systemic across the detection pipeline by examining the raw DNS log source against IDS-normalized alert output for these case timestamps. If the IDS normalization layer is consistently misreading response codes, TORA’s response_code_analysis step and the false-positive probability weights that depend on NOERROR are operating on unreliable input. The direction of the error matters: if IDS is inflating NOERROR confidence, TORA is systematically under-counting NXDOMAIN cases, which could suppress escalation of cases where the DNS channel failed but the host was compromised through an alternate path.
The prior alert closure pattern is the second priority. In VERA-20260402-0019, VERA-20260403-0021, and VERA-20260403-0025, critical or medium-severity alerts on hosts that later confirmed as compromised were closed before or during the compromise window. NOVA should examine whether the alerts closed in these cases (IDS-931655, IDS-732959, and the ESCALATED IDS-449162) were closed by TORA triage decisions, by automated suppression rules, or by human analyst action, and whether persistent attacker IPs (104.244.77.14, 91.92.251.103) share a pattern of generating pre-compromise alerts that are being systematically under-weighted at T1.
The EDR activity predating the SSH brute-force success trigger should be examined across all ssh_bruteforce_confirmed_access cases in the corpus — not just the three this shift. If the pattern is consistent, the forced-escalation rule is triggering on a trailing indicator and the detection architecture has a gap at an earlier kill-chain stage. NOVA should compare the EDR process start times against the brute-force success timestamps in the full SSH-correlated case set to determine whether this is a shift-specific observation or a systematic detection architecture finding.
The same_domain_count escalation trigger surfaces multi-asset scope without providing the co-querying asset identities in the investigation package. This gap appeared materially in VERA-20260330-0003 (4 hosts, 3 unidentified), VERA-20260331-0006 (4 hosts, 3 unidentified), VERA-20260401-0013 (4 hosts, 3 unidentified), VERA-20260403-0024 (3 hosts, 2 unidentified), and VERA-20260401-0015 (3 hosts, 2 unidentified). In every case, confirmed co-infected assets could not be investigated because their identities were not in the escalation package. If same_domain_count is a forced-escalation trigger, the asset list driving it should be included as a mandatory field. NOVA should evaluate whether the IDS surfaces this list downstream of alert normalization and whether the investigation package schema requires a schema update to capture it.
The concurrent multi-source C2 domain query pattern surfaced in VERA-20260402-0018, where SIEM raw events showed four distinct external source IPs querying telemetry-cloud-api.com within a 3-minute window concurrent with the primary alert. TORA’s same_domain_count field counts internal source IPs; it does not appear to capture concurrent external-source queries to the same C2 domain. If this pattern recurs, it suggests the current detection architecture is missing a campaign-level signal — coordinated or shared C2 infrastructure queried from multiple external actors simultaneously — that is not captured by any current escalation trigger. NOVA should examine whether this occurred in other cases and whether a time-windowed multi-source C2 query detection rule would improve campaign-level coverage.
Finally, the Sliver threat actor profile in VERA-20260402-0016 was marked available: true but contained entirely empty TTP arrays across known_ttps, known_c2_infrastructure, typical_persistence, and typical_lateral_movement. A populated TTP profile would have enabled structured investigation rather than behavioral inference from first principles. NOVA should audit the threat intel knowledge base for Sliver and other named post-exploitation frameworks to determine whether this is an isolated gap or indicative of incomplete coverage across the named-family profile set. The available: true flag on an empty profile is specifically misleading to investigation logic and should be corrected at the schema level if the problem is structural.
For ARIA
All 15 cases are pending ARIA action at immediate urgency. No cases are on hold.
The containment actions pending across the queue include network isolation of at least 8 distinct hosts (srv-ad-01.corp.local, srv-db-staging.corp.local, ws-fin-015.corp.local, 10.10.6.200, WEB-436, FILE-197, WORKSTATION-465, WEB-677, and additional lateral movement destinations), credential revocation for a minimum of 9 accounts (m.reyes, a.patel, svc_backup, svc_monitor, ctaylor, jsmith, alee, backup, ec2-user), and perimeter IOC blocking across at least 12 external C2 IPs and 6 malicious or suspicious domains.
Two cross-case coordination needs require explicit attention. First, attacker IP 104.244.77.14 appears as the confirmed SSH brute-force source in both VERA-20260401-0015 (srv-db-staging) and VERA-20260402-0020 (ws-fin-015), and has 5 prior unresolved alerts in the environment. This IP should be blocked at the perimeter globally, and all prior alert cases associated with it should be pulled for review — if prior alerts were closed without remediation, there may be additional uncontained footholds from earlier campaigns against the same infrastructure. Second, the m.reyes account appears in confirmed or probable post-compromise credential use across at least five separate cases this shift spanning three distinct hosts. This account should be suspended enterprise-wide and all active sessions terminated before isolation of individual hosts is completed, because credential-based lateral movement means host isolation alone will not contain an attacker operating under a live credential that remains valid on other systems. The domain controller compromise cases — specifically VERA-20260402-0019 and VERA-20260403-0025 both involving srv-ad-01.corp.local with active C2 and confirmed lateral movement — should be treated as a coordinated campaign against AD infrastructure, and ARIA’s response coordination should assume domain-wide credential exposure including double krbtgt rotation as a prerequisite for declaring containment complete.
VERA — Tier 2 Investigation — Eyes on the Glass: 2026-03-30 through 2026-04-03