Homepage
/
Case Studies
/
Silent Alerts: Anatomy of LockBit-Attributed Ransomware Intrusion
Apr 22, 2026

Silent Alerts: Anatomy of LockBit-Attributed Ransomware Intrusion

Security tools won't save you if nobody is watching them. This is a real-world investigation into a ransomware attack that was flagged, logged, and completely ignored for 97 days.

The Alarm Was Going Off, Nobody Picked Up.

Overview

A mid-sized organization. A misconfigured firewall. And 97 days of unnoticed activity that ended with ransomware encrypting everything in sight domain controllers, file servers, and virtual infrastructure, all in a single night.

When our DFIR team was called in, the damage was done. Within a couple of days we had the full picture. What we found was less about the attacker and more about the organization and the quiet, invisible gap between having security tools and actually being protected by them.

The Challenge

The organization wasn't ignoring security. They had invested in tools, had a perimeter firewall in place, and were running endpoint protection across parts of their environment. On paper, the foundations were there.

But several small, individual oversights had quietly stacked on top of each other:

  • A perimeter firewall running unpatched critical vulnerabilities, exposed to the internet
  • Endpoint protection partially deployed covering some systems, leaving others completely blind
  • Domain administrator credentials embedded into the firewall's LDAP integration with Active Directory
  • No defined process for what should happen when a security alert fires
  • No one reviewing coverage gaps or validating that the tools in place were actually working

None of these issues were catastrophic on their own. Together, they created an environment where an attacker could walk in, look around, and take their time and that is exactly what happened.

The Response

Our team was engaged after the ransomware had already executed. Within days, we had reconstructed the full attack timeline through forensic analysis of logs, artifacts, and endpoint telemetry piecing together 97 days of attacker activity from the first foothold to the final encryption.

What the investigation revealed was uncomfortable but clear:

  • Microsoft Defender flagged a known ransomware binary on day one nobody responded
  • Multiple high and critical severity alerts fired over the following weeks none were acted on
  • Over 5,000 files were exfiltrated to an external server while the alerts sat unacknowledged
  • The attacker disabled security products across domain controllers before deploying ransomware
  • By the time anyone noticed, domain controllers, file servers, and ESXi virtual infrastructure had all been encrypted

The attacker was not sophisticated. They were simply patient. And in an environment where nobody was watching, patience was all they needed.

Outcome

The investigation gave the organization something they didn't have before the incident complete visibility into exactly what happened and a clear understanding of why.

The forensic timeline showed the breach was preventable at multiple points through:

  • Consistent patch management on perimeter devices
  • Full endpoint protection coverage across every system
  • Least privilege principles applied to service accounts and integrations
  • A defined alert triage and escalation process with clear ownership
  • Regular configuration reviews before an attacker finds the gaps for you

The full findings, forensic evidence, and recommendations are documented in the report.

Client Testimonial

Relevant Case Studies

check all CASE STUDIES

Silent Alerts: Anatomy of LockBit-Attributed Ransomware Intrusion

How We Secure Contained an APT41 Keylogger Campaign in 72 Hours

Smartphone screen displaying an order management app showing a bicycle image, stock levels, and order details.
Cybersecurity

Blog post content can contain one or two lines of text for better experience

Person using a laptop displaying a dark-themed workflow or automation software interface with a flowchart design.
Data Control

Blog post content can contain one or two lines of text ...

Laptop screen showing an inventory management dashboard with product SKU, name, quantity, category, and date/time for various electronic items.
Security Consulting

Blog post content can contain one or two lines of text ...

Person using a laptop displaying a dark-themed workflow or automation software interface with a flowchart design.
Data Control

Blog post content can contain one or two lines of text ...

Person using a laptop displaying a dark-themed workflow or automation software interface with a flowchart design.
Data Control

Blog post content can contain one or two lines of text ...