CTF: Your IT Provider Got Hacked — And So Did You"
Difficulty: Hard | Time: 25–35 min | Linked product: IRP Template ($47)
The Setup
It's Friday at 4:45 PM. Your managed service provider (MSP) — the company that manages your servers, backups, and workstations for your 30-person logistics company in Townsville — calls you.
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
"We need to let you know we've had a security incident. We're still investigating, but our RMM platform may have been used to access some client environments between Tuesday and Friday. We're asking all clients to check their systems for unusual activity."
They hang up quickly — they've clearly got 50 of these calls to make.
You open Task Manager on your main server. Two processes you don't recognise: svchost_update.exe and nvmupdate.exe. Both running as SYSTEM. Both have outbound TCP connections on port 443 to IPs in Eastern Europe. Your backup software shows the last successful backup was Monday. Today is Friday.
This is a supply chain / MSP compromise. Your trusted IT provider's remote management tool became the attacker's entry point. You effectively had someone with admin access to your environment for three days.
What do you do when the people you trusted with your systems are the reason you've been compromised?
The Challenge
Question 1 — Severing the MSP connection
Your first instinct is correct: the MSP's RMM agent is still installed on your systems and potentially still under attacker control. But your MSP also manages your backups, your server patching, and your firewall. Cutting them off has operational consequences.
- What's the correct sequence for severing the RMM connection without losing your operational backup and monitoring capabilities?
- How do you determine which of your systems have the RMM agent installed?
- Who in your organisation has the authority to make this call? (Your MSP contract likely has clauses about unilateral changes. Does that matter in a crisis?)
Question 2 — Scoping the damage
The attack
Free Resource
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →List five categories of malicious activity that an attacker with admin-level RMM access could have performed during a 72-hour dwell time. For each, describe the forensic indicator that would confirm whether it happened.
Question 3 — The backup problem, revisited
Your last good backup was Monday. It's Friday. You have a four-day gap. Your business runs on a logistics management system — four days of shipment records, driver logs, and client invoicing data.
- If you were ransomwared right now (entirely possible given what's on your systems), what's the recovery time and recovery point for your critical logistics system?
- What's the difference between an RTO and an RPO, and what are yours right now?
- Is there any source of partial data recovery for the four-day gap that doesn't rely on your backup system?
Question 4 — Your MSP's liability
Your MSP's RMM platform was compromised through a vulnerability in their tool. This wasn't your misconfiguration — it was theirs. You want to understand your options.
- What does your MSP contract likely say about liability for security incidents caused by the MSP's own systems?
- In Australia, what legal avenues exist for recovering damages from an MSP that negligently exposed your environment?
- What should you do right now in terms of evidence preservation related to the MSP relationship?
Question 5 — Third-party risk in future: What should your contract have said?
If your MSP contract had been written properly from a security perspective, what three clauses would now be giving you much stronger legal and operational protection?
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for SMBs worldwide.
Get the Starter Pack →Hints
Hint 1 (Q1): The RMM agent runs as a service. You can disable the service without uninstalling it — this severs the attacker's access while preserving the installed software for forensic examination. services.msc or sc stop [service name] followed by sc config [service name] start= disabled. Identify the MSP's specific RMM tool (Kaseya, ConnectWise Automate, NinjaRMM, etc.) — each has a documented service name. Your MSP contract almost certainly does not give you a right to damages for their security failures — these contracts are almost universally written with broad liability caps and indemnity protections for the MSP.
Hint 2 (Q2): Five categories: credential harvesting (dump LSASS, pull SAM/NTDS.dit), persistence installation (scheduled tasks, registry run keys, new service creation), data exfiltration (bulk file copy to external destination), lateral movement staging (enumeration of other hosts in the environment), and ransomware pre-staging (disabling shadow copies, deleting backups, mapping drives). Each has specific forensic artefacts: Windows Event IDs, scheduled task logs, network connection logs, VSS deletion events.
Hint 3 (Q3): RTO (Recovery Time Objective) is how long you can tolerate being down. RPO (Recovery Point Objective) is how much data loss you can accept. Right now, your RPO is four days and your RTO is unknown (you haven't tested restoration). Partial data recovery sources for the four-day gap: transaction logs in your logistics software's database (if not encrypted), email records of invoices and dispatch notifications, mobile devices used by drivers (GPS logs, app-level records), and client portals if your logistics system has them.
Hint 4 (Q4): Australian MSP contracts typically cap liability at the value of the annual contract. If your MSP charges you $3,000/year, their maximum liability is often $3,000 regardless of the damage. Claims in negligence (Australian Consumer Law, tort of negligence) can go beyond contract caps, but are harder to establish. Evidence preservation: keep all communications with the MSP, get their incident report in writing, do not sign any "we're sorry" document they send that includes liability waivers.
Hint 5 (Q5): The three clauses: (1) Minimum security standard for the MSP's own infrastructure (requiring MFA, vulnerability management, incident response procedures); (2) Right to audit or receive security certification from the MSP annually; (3) Liability uncap for incidents caused by the MSP's own security failures. Almost no MSP will sign the third clause — but asking for it tells you something about their security posture.
Reveal: Full Answer to Question 2
Five categories of malicious activity with forensic indicators:
1. Credential harvesting
What happened: Attacker dumps credentials from memory or the registry to obtain all usernames and passwords on the compromised host — enabling further access even after the RMM is blocked.
Forensic indicator: Windows Security Event ID 4624 (successful logon) with unexpected logon types (Type 3 = network, Type 10 = remote interactive) from unusual source IPs. Also check for processes accessing LSASS memory: Security Event ID 10 in Sysmon logs (lsass.exe as target process). On domain-joined systems, check for NTDS.dit access: Event ID 4799, or the presence of Volume Shadow Copy deletion events.
2. Persistence installation
What happened: Attacker installs a backdoor that survives the RMM being disconnected — a scheduled task, a new Windows service, or a registry Run key.
Forensic indicator: Check HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and the equivalent CurrentVersion\RunOnce keys for entries created in the Tuesday–Friday window. Check C:\Windows\System32\Tasks\ for scheduled tasks with recent creation timestamps. Use schtasks /query /fo LIST /v and sort by "Last Run Time." Check Windows Event ID 7045 (new service installed).
3. Data exfiltration
What happened: Attacker copies files to an external destination — either via the RMM channel itself or via a second outbound connection.
Forensic indicator: Check Windows Event ID 5145 (network share access) and 4663 (file access auditing, if enabled). Check your firewall logs for unusual data volumes outbound from your server IPs during Tuesday–Friday — a large file exfiltration shows up as a sustained high-bandwidth outbound connection. The nvmupdate.exe process already flagged with an Eastern European IP is your primary indicator.
4. Shadow copy and backup deletion
What happened: Pre-ransomware staging step — attacker deletes Volume Shadow Copies and backup jobs to eliminate your recovery options.
Forensic indicator: Check vssadmin list shadows — if no shadows exist and your server has been running for more than a day, they may have been deleted. Windows Event ID 7036 (service state change) for backup services. Check whether your backup software's scheduled jobs are still active. The fact that your last backup was Monday (four days ago) while backups were presumably scheduled nightly is itself a strong indicator this step may have occurred.
5. Lateral movement staging
What happened: Attacker uses admin access on one system to enumerate and prepare access to other systems in your network — building a map of your environment.
Forensic indicator: Windows Event ID 4648 (logon with explicit credentials — i.e., using a specific username/password rather than current session). Network logon events (Type 3) from the compromised server to other internal hosts. Check the %TEMP% and %APPDATA% folders on the compromised host for network scanning output files — many attackers use tools like net view, nmap, or AD enumeration tools whose output gets saved to temp.
Get the Full Answer Key
You've seen the damage scoping answer in full. The remaining questions — on severing the RMM connection safely, RTO/RPO assessment, MSP liability under Australian law, and the contract clauses you need — are covered in the Incident Response Plan Template for SMBs.
The template includes:
- MSP/third-party IR playbook with RMM disconnection steps
- Windows forensic indicator checklist (Event IDs, artefact locations)
- RTO/RPO worksheet
- MSP contract security clause reference (what to ask for)
- Third-party breach notification template
Get the IRP Template for $47 → lil.business/products/incident-response-plan-template
Or buy via Polar: https://buy.polar.sh/polar_cl_G95ZMX6xnZpa7JuXj1AROgffKr1aL0JDmJ2KU1rHJ84
The MSP RMM compromise scenario reflects documented attack patterns including the 2021 Kaseya VSA incident and subsequent copycat attacks. Windows Event IDs are accurate for Windows Server 2019/2022.
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →