RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial LossRefused to Pay
Operational Impact$100 Million Loss
Day 0

Vishing Attack

Attackers impersonate an employee in a call to the IT Help Desk to reset MFA.

Day 1

Identity Takeover

Attackers gain Okta Super Admin access.

Day 5

ESXi Encryption

BlackCat ransomware deployed to ESXi hypervisors.

Day 10

Recovery

Systems slowly restored from backups.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

MGM, we have your data...

WALLET ADDRESS

bc1q... (Not Paid)

SHA-256 HASH

e2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1

EXPLOITED VULNERABILITIES

Social EngineeringOkta
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

Weak Help Desk Verification

The Solution

Implement visual verification for help desk requests.

Explore Social Engineering Simulation

The Failure

Over-Privileged Okta Access

The Solution

Apply Principle of Least Privilege to IdP roles.

Explore Cloud Security Assessment

The Failure

Flat Network

The Solution

Segment critical infrastructure (ESXi).

Explore Network Pentesting

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.