Sensitive Data Theft

Data Exfiltration can be quite dangerous for any company, especially when exfiltrated data contains Personal Identifiable Information or even Identity Documents.
Although the risk isn’t completely removable, ZADIG Smart can protect you from various attacks, preserving your (and your user’s) privacy.

The Stage

This luxury hotel is celebrated as a renowned establishment of exceptional repute, where unparalleled services and unforgettable experiences await discerning guests. Exuding opulence and elegance in every detail, the hotel offers a myriad of exquisite amenities and personalized offerings that cater to the discerning tastes of its esteemed clientele.

With an unwavering commitment to excellence, the hotel boasts world-class concierge service, ensuring that every guest’s desires and preferences are meticulously attended to. Exclusive access to coveted events and venues, as well as bespoke dining experiences crafted by renowned chefs, are just a few examples of the extraordinary offerings that set this luxury hotel apart.

By seamlessly integrating cutting-edge technology with impeccable hospitality, this luxury hotel creates a sanctuary of elegance and tranquility, allowing discerning guests to indulge in a world of unmatched luxury and exceptional service.

Evening
18:17
Evening
18:17
The attacker check-in to the luxury hotel, appearing like any other guest.
23:02
23:02
Under the cover of darkness, the attacker discreetly unplugs the ethernet cable from their room's smart TV, getting ready for the illicit activity.
23:05
23:05
The attacker initiates a deliberate and slow network scan, taking precautionary measures to avoid arousing suspicion.
00:23
00:23
The network scan is completed, and the attacker identifies an unprotected NAS within the hotel's network, providing a potential gateway to valuable data.
Night
00:24
Night
00:24
With unauthorized access obtained, the attacker begins exploring the contents of the NAS, searching for worthwhile information.
00:35
00:35
Within the NAS, the attacker stumbles upon a folder containing ID cards dating back to last months' guests. Additionally, a comprehensive Excel file with missing guest information is discovered.
00:41
00:41
Unable to find further valuable data, the attacker proceeds to extract and copy on their personal device the previously identified information.
00:52
00:52
Satisfied with the data obtained, the attacker concludes their activities and goes to sleep, leaving no trace of their nefarious actions.
Morning
07:03
Morning
07:03
The attacker checks out of the hotel, blending in with other departing guests, leaving behind no indication of their true intentions.
09:21
09:21
Having reached a secure location, the attacker begins inspecting the retrieved data, examining carefully its potential value and relevance.
The Consequencies
Legal Liability
All user data were found in the dark web, and were tracked back to this attack. Those info where used to make illegal activities with the users' name. The hotel is facing dozen of trials, with nearly no chance of being proven innocent.
Economic Losses
Legal expenses, reparations, productivity and time losses, a steep drop in reservations... A simple ethernet cable is costing this hotel Millions of dollars, with way more to come.
Reputation Damage
Being known to put guest's privacy as a priority, this hotel has completely lost all the trust clients. Years of hard work, destroyed in a single night.
ZADIG Smart
provides at least three solutions to stop this attacks

This complex (yet powerful) attack could have been completely stopped not only in one, but even in three different phases: at the real edge, in the network, and during data access.

Although just a single protection could have prevented the leak, with ZADIG Smart we have integrated all three those protection, to give you the best possible security prevention.

Do you wish to prevent and eliminate these threats?
Network Authentication
Keep out intruders! Allow only authorized devices to connect to your network through robust network authentication measures. By implementing stringent authentication protocols such as 802.11x, you can ensure that only trusted devices gain access. Our solution also includes seamless auto-configuration of devices using our Mobile Device Management (MDM) system, simplifying the onboarding process while maintaining a high level of security. Don't leave your network vulnerable to unauthorized access – fortify it with strong network authentication.
Network Segmentation
Segregate different traffic and enhance your network security. By implementing network segmentation, you create independent partitions that prevent unauthorized lateral movement within your network. Keep trusted and untrusted traffic separate, minimizing the risk of data breaches. Our solution empowers you to control traffic flow, ensuring that critical information remains secure. Take charge of your network security by segregating your network and safeguarding your valuable assets.
Active Directory
Boost security with Active Directory. Embed strong, centralized authentication into your systems to ensure high levels of protection. Active Directory provides a comprehensive solution for managing user accounts and enforcing security policies. With a single credential, you can streamline authentication processes while maintaining stringent security measures. Gain granular control over user permissions, preventing unauthorized access and data breaches. Active Directory empowers you to establish a robust security framework, safeguarding your sensitive data with ease.
ZADIG Smart by
bitCorp
Legal Head Office:
Via Monte Bianco 2/A, 20149, Milano
Representative Office:
Galleria del Corso 4, 20121, Milano
Operational Headquarter:
Via Carlo Freguglia 10, 20122, Milano
en_US