Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Wayne Racey
Manager of IT Operations, City of St Catharines (Guest Contributor)
Share
08
Aug 2022
The City of St. Catharines is the largest city in Ontario, Canada’s Niagara Region. We strive to meet the needs of our over 140,000 residents. Cyber disruption could stop our municipality from functioning, so having a strong security stack is critical to our mission.
Globally, 44% of ransomware attacks target municipalities. In Canada, smaller cities have had to deal with increased attempts by threat actors to access information, without significant increases in security staff or budgets.
Data breaches incur an average cost totaling $6.35 million CAD because of ransomware payments, fines for leaked personally identifiable information, or recovery costs. That number does not quantify the additional reputational damage, PR setbacks, and other repercussions. Instead of resigning ourselves to accepting a greater cyber-risk, we turned to Darktrace to protect our network, email, and Microsoft 365 Suite.
How Self-Learning AI buys back time
I’m sure we as a municipality are grappling with the same issues that other cities of a similar size face from a budgetary standpoint. We do not have enough boots on the ground and our IT team is stretched thin. Investigating cyber security incidents takes a lot of time. We must find correlations between several old systems and manually go through security event logs to determine which incidents require follow-up. These factors greatly increased our response time.
When we first implemented Darktrace, we immediately saw that it does all the heavy lifting for us when it comes to the analysis of breach events. The Cyber AI Analyst shows a granular breakdown of the digital traffic coming into and out of the City, all on a single screen. This helps us separate the meaningful data from the noise.
I now start all my investigations with the Cyber AI Analyst. It sets me up with actionable insights that ensure I focus my time and energy in the most productive ways.
Darktrace also saves my team time and labor when it comes to responding to incidents. When it does detect attacks, it autonomously responds in seconds to contain them without interfering with any normal business operations.
We have been able to configure Darktrace’s settings to further streamline our workload. We’ve made several adjustments that reduce the number of helpdesk tickets my team receives, which ensures we’re spending our time on high-value work.
Darktrace not only makes up for the limited resources of our IT team, but also augments us. By simplifying our investigations and autonomously stopping attacks, Darktrace gives us more time to work on our other IT responsibilities without worrying about our security.
Darktrace/Network brings visibility and defense
Before Darktrace, we didn’t have visibility into the east-west traffic on our network. Once installed, it provided a view of traffic we had never anticipated, and we saw connections that we never even knew existed.
Darktrace/Network has insight into every laptop, server, phone, and user. The Self-Learning AI learns the “pattern of life” of our organization, so that it can recognize unusual activity that indicates a cyber-attack. In the case of a serious emerging attack, Darktrace RESPOND can take precise actions to stop it while otherwise allowing normal digital operations.
Darktrace/Network maps connections made within our network, whether between users and servers or between devices. It sorts users into groups that behave similarly, making it more obvious if one acts unusually. Darktrace/Email and Darktrace/Apps extend this coverage to our email and Microsoft 365 Suite, respectively. In this way, Darktrace allows us to see comprehensively into end-user traffic.
Darktrace can stop attempts to download malicious software, move malware laterally, upload private data, and everything in between. This means we are protected from attacks that are notoriously difficult to find, such as stealth attacks, machine speed ransomwares, insider threats, and zero-days.
Darktrace brings peace of mind
The Self-Learning AI has transformed my skepticism of AI into enthusiasm. I now see the possibilities with AI are limited only by one’s imagination, and the Darktrace team has harnessed it to create a great security tool.
Darktrace has proven to be the addition we needed to keep our digital landscape secure while contending with the limitations of budget and staffing during a time of increasingly frequent attacks targeting municipalities. My team’s support for Darktrace has been outstanding, and we have no regrets.
Darktrace gives us the assurance that no matter what rules we put in place regarding the flow of traffic on our network, it will always be present to reconfigure our defenses and safeguard our digital assets should an attack occur. It works 24/7, at machine speed, and augments our IT team. That defines peace of mind!
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Wayne Racey
Manager of IT Operations, City of St Catharines (Guest Contributor)
Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36)
Since 2018, Blind Eagle has targeted Latin American organizations using phishing and RATs. Darktrace detected Blind Eagle activity on a customer network involving C2 connectivity, malicious payload downloads and data exfiltration. Without Autonomous Response, the attack escalated, highlighting the need for proactive detection and response defense to counter fast-evolving threats.
Customer Case Study: Leading Petrochemical Manufacturer
An industry leading petrochemical manufacturer uses the Darktrace ActiveAI Security Platform to improve visibility, protect against supply chain attacks, and save the security team hundreds of hours of incident investigation.
Tracking CVE-2025-31324: Darktrace’s detection of SAP Netweaver exploitation before and after disclosure
A critical SAP vulnerability, CVE-2025-31324, allows unauthenticated remote code execution via NetWeaver Visual Composer. Despite early mitigation guidance, many systems remain exposed. Darktrace detected exploitation attempts six days before public disclosure, highlighting the importance of proactive, threat-agnostic detection.
Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36)
What is Blind Eagle?
Since 2018, APT-C-36, also known as Blind Eagle, has been observed performing cyber-attacks targeting various sectors across multiple countries in Latin America, with a particular focus on Colombian organizations.
Blind Eagle characteristically targets government institutions, financial organizations, and critical infrastructure [1][2].
Attacks carried out by Blind Eagle actors typically start with a phishing email and the group have been observed utilizing various Remote Access Trojans (RAT) variants, which often have in-built methods for hiding command-and-control (C2) traffic from detection [3].
What we know about Blind Eagle from a recent campaign
Since November 2024, Blind Eagle actors have been conducting an ongoing campaign targeting Colombian organizations [1].
In this campaign, threat actors have been observed using phishing emails to deliver malicious URL links to targeted recipients, similar to the way threat actors have previously been observed exploiting CVE-2024-43451, a vulnerability in Microsoft Windows that allows the disclosure of a user’s NTLMv2 password hash upon minimal interaction with a malicious file [4].
Despite Microsoft patching this vulnerability in November 2024 [1][4], Blind Eagle actors have continued to exploit the minimal interaction mechanism, though no longer with the intent of harvesting NTLMv2 password hashes. Instead, phishing emails are sent to targets containing a malicious URL which, when clicked, initiates the download of a malicious file. This file is then triggered by minimal user interaction.
Clicking on the file triggers a WebDAV request, with a connection being made over HTTP port 80 using the user agent ‘Microsoft-WebDAV-MiniRedir/10.0.19044’. WebDAV is a transmission protocol which allows files or complete directories to be made available through the internet, and to be transmitted to devices [5]. The next stage payload is then downloaded via another WebDAV request and malware is executed on the target device.
Attackers are notified when a recipient downloads the malicious files they send, providing an insight into potential targets [1].
Darktrace’s coverage of Blind Eagle
In late February 2025, Darktrace observed activity assessed with medium confidence to be associated with Blind Eagle on the network of a customer in Colombia.
Within a period of just five hours, Darktrace / NETWORK detected a device being redirected through a rare external location, downloading multiple executable files, and ultimately exfiltrating data from the customer’s environment.
Since the customer did not have Darktrace’s Autonomous Response capability enabled on their network, no actions were taken to contain the compromise, allowing it to escalate until the customer’s security team responded to the alerts provided by Darktrace.
Darktrace observed a device on the customer’s network being directed over HTTP to a rare external IP, namely 62[.]60[.]226[.]112, which had never previously been seen in this customer’s environment and was geolocated in Germany. Multiple open-source intelligence (OSINT) providers have since linked this endpoint with phishing and malware campaigns [9].
The device then proceeded to download the executable file hxxp://62[.]60[.]226[.]112/file/3601_2042.exe.
Figure 1: Darktrace’s detection of the affected device connecting to an unusual location based in Germany.
Figure 2: Darktrace’s detection of the affected device downloading an executable file from the suspicious endpoint.
The device was then observed making unusual connections to the rare endpoint 21ene.ip-ddns[.]com and performing unusual external data activity.
This dynamic DNS endpoint allows a device to access an endpoint using a domain name in place of a changing IP address. Dynamic DNS services ensure the DNS record of a domain name is automatically updated when the IP address changes. As such, malicious actors can use these services and endpoints to dynamically establish connections to C2 infrastructure [6].
Further investigation into this dynamic endpoint using OSINT revealed multiple associations with previous likely Blind Eagle compromises, as well as Remcos malware, a RAT commonly deployed via phishing campaigns [7][8][10].
Figure 3: Darktrace’s detection of the affected device connecting to the suspicious dynamic DNS endpoint, 21ene.ip-ddns[.]com.
Shortly after this, Darktrace observed the user agent ‘Microsoft-WebDAV-MiniRedir/10.0.19045’, indicating usage of the aforementioned transmission protocol WebDAV. The device was subsequently observed connected to an endpoint associated with Github and downloading data, suggesting that the device was retrieving a malicious tool or payload. The device then began to communicate to the malicious endpoint diciembrenotasenclub[.]longmusic[.]com over the new TCP port 1512 [11].
Around this time, the device was also observed uploading data to the endpoints 21ene.ip-ddns[.]com and diciembrenotasenclub[.]longmusic[.]com, with transfers of 60 MiB and 5.6 MiB observed respectively.
Figure 4: UI graph showing external data transfer activity.
This chain of activity triggered an Enhanced Monitoring model alert in Darktrace / NETWORK. These high-priority model alerts are designed to trigger in response to higher fidelity indicators of compromise (IoCs), suggesting that a device is performing activity consistent with a compromise.
Figure 5: Darktrace’s detection of initial attack chain activity.
A second Enhanced Monitoring model was also triggered by this device following the download of the aforementioned executable file (hxxp://62[.]60[.]226[.]112/file/3601_2042.exe) and the observed increase in C2 activity.
Following this activity, Darktrace continued to observe the device beaconing to the 21ene.ip-ddns[.]com endpoint.
Darktrace’s Cyber AI Analyst was able to correlate each of the individual detections involved in this compromise, identifying them as part of a broader incident that encompassed C2 connectivity, suspicious downloads, and external data transfers.
Figure 6: Cyber AI Analyst’s investigation into the activity observed on the affected device.
Figure 7: Cyber AI Analyst’s detection of the affected device’s broader connectivity throughout the course of the attack.
As the affected customer did not have Darktrace’s Autonomous Response configured at the time, the attack was able to progress unabated. Had Darktrace been properly enabled, it would have been able to take a number of actions to halt the escalation of the attack.
For example, the unusual beaconing connections and the download of an unexpected file from an uncommon location would have been shut down by blocking the device from making external connections to the relevant destinations.
Conclusion
The persistence of Blind Eagle and ability to adapt its tactics, even after patches were released, and the speed at which the group were able to continue using pre-established TTPs highlights that timely vulnerability management and patch application, while essential, is not a standalone defense.
Organizations must adopt security solutions that use anomaly-based detection to identify emerging and adapting threats by recognizing deviations in user or device behavior that may indicate malicious activity. Complementing this with an autonomous decision maker that can identify, connect, and contain compromise-like activity is crucial for safeguarding organizational networks against constantly evolving and sophisticated threat actors.
Credit to Charlotte Thompson (Senior Cyber Analyst), Eugene Chua (Principal Cyber Analyst) and Ryan Traill (Analyst Content Lead)
Appendices
IoCs
IoC – Type - Confidence Microsoft-WebDAV-MiniRedir/10.0.19045 – User Agent
62[.]60[.]226[.]112 – IP – Medium Confidence
hxxp://62[.]60[.]226[.]112/file/3601_2042.exe – Payload Download – Medium Confidence
21ene.ip-ddns[.]com – Dynamic DNS Endpoint – Medium Confidence
diciembrenotasenclub[.]longmusic[.]com - Hostname – Medium Confidence
Darktrace’s model alert coverage
Anomalous File / Suspicious HTTP Redirect Anomalous File / EXE from Rare External Location Anomalous File / Multiple EXE from Rare External Location Anomalous Server Activity / Outgoing from Server Unusual Activity / Unusual External Data to New Endpoint Device / Anomalous Github Download Anomalous Connection / Multiple Connections to New External TCP Port Device / Initial Attack Chain Activity Anomalous Server Activity / Rare External from Server Compromise / Suspicious File and C2 Compromise / Fast Beaconing to DGA Compromise / Large Number of Suspicious Failed Connections Device / Large Number of Model Alert
Mitre Attack Mapping:
Tactic – Technique – Technique Name
Initial Access - T1189 – Drive-by Compromise Initial Access - T1190 – Exploit Public-Facing Application Initial Access ICS - T0862 – Supply Chain Compromise Initial Access ICS - T0865 – Spearphishing Attachment Initial Access ICS - T0817 - Drive-by Compromise Resource Development - T1588.001 – Malware Lateral Movement ICS - T0843 – Program Download Command and Control - T1105 - Ingress Tool Transfer Command and Control - T1095 – Non-Application Layer Protocol Command and Control - T1571 – Non-Standard Port Command and Control - T1568.002 – Domain Generation Algorithms Command and Control ICS - T0869 – Standard Application Layer Protocol Evasion ICS - T0849 – Masquerading Exfiltration - T1041 – Exfiltration Over C2 Channel Exfiltration - T1567.002 – Exfiltration to Cloud Storage
Darktrace Collaborates with Microsoft: Unifying Email Security with a Shared Vision
In today’s threat landscape, email remains the most targeted vector for cyberattacks. Organizations require not only multi-layered defenses but also advanced, integrated systems that work collaboratively to proactively mitigate threats before they cause damage
That’s why we’re proud to announce a new integration between Darktrace / EMAIL and Microsoft Defender for Office 365, delivering a Unified Quarantine experience that empowers security teams with seamless visibility, control, and response across both platforms.
This announcement builds on a strong and growing collaboration. In 2024, Darktrace was honored as Microsoft UK Partner of the Year and recognized as a Security Trailblazer at the annual Microsoft Security 20/20 Awards, a testament to our shared commitment to innovation and customer-centric security.
A Shared Mission: Stopping Threats at Machine Speed
This integration is more than a technical milestone,as it’s a reflection of a shared mission: to protect organizations from both known and unknown threats, with efficiency, accuracy, and transparency.
Microsoft Defender for Office 365 delivers a comprehensive security framework that safeguards Microsoft 365 email and collaboration workloads leveraging advanced AI, global threat intelligence and information on known attack infrastructure.
Darktrace / EMAIL complements this with Self-Learning AI that understands the unique communication patterns within each organization, detecting subtle anomalies that evade traditional detection methods.
Together, we’re delivering multi-layered, adaptive protection that’s greater than the sum of its parts.
“Our integration with Microsoft gives security teams the tools they need to act faster and more precisely to detect and respond to threats,” said Jill Popelka, CEO of Darktrace. “Together, we’re strengthening defenses where it matters most to our customers: at the inbox.”
Unified Quarantine: One View, Total Clarity
The new Unified Quarantine experience gives customers a single pane of glass to view and manage email threatsregardless of which product took action. This means:
Faster investigations with consolidated visibility
Clear attribution of actions and outcomes across both platforms
Streamlined workflows for security teams managing complex environments
“This integration is a testament to the power of combining Microsoft’s global threat intelligence with Darktrace’s unique ability to understand the ‘self’ of an organization,” said Jack Stockdale, CTO of Darktrace. “Together, we’re delivering a new standard in proactive, adaptive email security.”
A New Era of Collaborative Cyber Defense
This collaboration represents a broader shift in cybersecurity: from siloed tools to integrated ecosystems. As attackers become more sophisticated, defenders must move faster, smarter, and in unison.
Through this integration, Darktrace and Microsoft establish a new standard for collaboration between native and third-party security solutions, enhancing not only threat detection but also comprehensive understanding and proactive measures against threats.
We’re excited to bring this innovation to our customers and continue building a future where AI and human expertise collaborate to secure the enterprise.