Foxhole Demo

Interactive demonstration of our behavioral AI detecting a sophisticated 8-month data exfiltration campaign that was invisible to traditional security tools.

Attack Timeline

Jan 15, 2024
Initial Compromise
Vendor credentials phishing → VPN access
Feb - Mar 2024
Silent Reconnaissance
Network mapping, asset discovery, privilege escalation
Apr - Jun 2024
Data Staging
Slow collection of source code to temp folders
Jul - Sep 2024
Low-and-Slow Exfiltration
100-200MB/hour via DNS tunneling (appears legitimate)
Oct 2024 - Present
Ongoing Campaign
Continues targeting new repositories

Analysis Details

Select a timeline event to view detailed analysis
Initial Compromise
Confidence: 98% Severity: Critical
Attack Vector
Sophisticated phishing campaign targeting vendor IT admin. Attackers used lookalike domain and captured VPN credentials through reverse proxy.
Foxhole Detection
Behavioral AI identified anomalous login patterns: vendor account accessing from new geolocation at unusual hours with slight timing variations suggesting automated tools.
Silent Reconnaissance
Confidence: 94% Severity: High
Attack Method
Slow, methodical network exploration using valid credentials. Attackers paced activities to stay under detection thresholds, scanning only a few subnets per day.
Foxhole Detection
Identified subtle pattern: reconnaissance queries always preceded by 3-4 "decoy" legitimate-looking requests. This behavioral signature is invisible to rule-based systems.
Data Staging
Confidence: 91% Severity: High
Attack Method
Created encrypted archives in temporary folders, naming them to blend in with legitimate system files. Used file timestamps from existing files to avoid detection.
Foxhole Detection
Behavioral anomaly: temp folder encryption operations followed by extended periods of inactivity—pattern matching "hoarding" behavior before exfiltration.
Low-and-Slow Exfiltration
Confidence: 97% Severity: Critical
Attack Method
DNS tunneling with data rates carefully tuned to blend with legitimate DNS traffic. Encoded payloads as DNS TXT records. Varied exfiltration rate based on time of day.
Foxhole Detection
Machine learning model detected statistical anomalies in DNS query patterns: entropy distribution of domain names, request timing correlations with temp folder activity, and base64-encoded payloads in TXT responses.
🔮 AI Prediction
Based on pattern analysis, attacker will likely target customer database next. Estimated exfiltration window: November 15-30, 2024. Recommended action: isolate customer DB access and implement enhanced monitoring.
Ongoing Campaign
Confidence: 95% Severity: Critical
Current Status
Attacker maintains persistent access through scheduled tasks and registry run keys. Continues to explore new repositories, currently targeting R&D documentation archives.
Immediate Actions
1. Revoke all vendor credentials immediately
2. Isolate affected systems from network
3. Forensic imaging of temp directories
4. Implement DNS monitoring with Foxhole sensors
5. Review and rotate all privileged credentials
🔮 AI Prediction
Campaign enters final phase: attacker preparing to deploy backdoor for persistent access before completing exfiltration. Expected within 72 hours. Urgent intervention required.
Start Your Free Trial