Dan to the Defence - Part One - Transcript
Narrator: Dan is the I.T. manager at the same health care facility that Chris and Cindy work at. He is going through IT tickets and notices he is beginning to receive a lot of different alerts about potential cyber threats on all work devices.
Anon: This is getting ridiculous. When is somebody going to fall for one of my cyber-attacks? What do you think I should do, Phish? That's a great idea! I will use the dark web to see if I can access any of the employee's personal emails. Credentials get sold on forums on the web all the time. From there, I am going to see if any of their emails are linked to breached accounts. I'm sure there are lots of passwords for me to get my hands on and try and log in on their work accounts.
Well, well, well... Look at what we have here Phish, a database of compromised passwords linked to the health care facilities employees' personal email addresses. Now we can check and see if any of them are still using the same passwords for their work accounts. Hopefully, some were forgetful enough to do so. I'm going to make a computer program that will cross-reference these breach passwords with the employee's other personal and work accounts.
Narrator: Wanting to see what was happening. Dan begins to review the alerts he is receiving on his devices. He looks at his computer and notices that both Chris and Cindy have flagged and reported various suspicious activities happening. Dan is very impressed that they have reported these cyber threats. However, Dan grows concerned as he notices a pattern of a bigger attack forming.
Dan: This is much bigger than email phishing...
Anon: Ah, the computer program is finally complete! Now you and I can sit back and relax Phish until we see if there's a match.