Select Case File (DRAG TO EXPLORE)
NotPetya
The Most Destructive Cyberattack in History
WannaCry
The NHS Crippler
SolarWinds
The Sunburst Backdoor
Colonial Pipeline
DarkSide Ransomware
Equifax
The Apache Struts Breach
MGM Resorts
Social Engineering Masterclass
Target
The HVAC Vendor Breach
Stuxnet
The First Cyber Weapon
Sony Pictures
The Guardians of Peace
Marriott (Starwood)
The 4-Year Breach
The Kill Chain
A chronological reconstruction of the attack vectors used to compromise the target.
Impact Assessment
Initial Access
Attackers gain access via a compromised VPN password for an inactive account. No MFA.
Lateral Movement
DarkSide actors move laterally through the IT network, escalating privileges.
Data Exfiltration
100GB of sensitive data is stolen for double extortion.
Encryption
Ransomware deployed. Pipeline operations halted proactively.
Evidence Board
CONFIDENTIAL // EYES ONLYRANSOM_NOTE.TXT
WALLET ADDRESS
SHA-256 HASH
EXPLOITED VULNERABILITIES
Weak CredentialsVPNHow We Would Have Stopped It
Mapping the specific security failures to RadiumFox's preventative services.
The Failure
Single-Factor VPN
The Failure
Lack of Segmentation
The Failure
Inactive Account
Join Us. Cut Costs.
Focus on What Matters.
Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.
Submit Info
Share your environment, scope, or compliance needs via our quick form.
Senior Review
A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.
Optional Scoping Call
We'll clarify priorities and technical details if needed.
Clear Quote
Expect a fixed-cost proposal—no hidden fees or fluff.
Fast Kickoff
Once approved, most projects launch within 5–7 business days with full support.