Leo sat next to her, staring at his now-quarantined laptop. “So… do I still have a job?”
Her phone buzzed. Leo Vance, her new junior analyst, sounded breathless. “Maya, you need to see this. I think… I think I let it in.” linkedin ethical hacking: trojans and backdoors
Within minutes, “Sarah K.”—or whoever controlled the puppet profiles—sent Maya a connection request. She accepted. Then she opened a private sandbox environment, logged into her dummy corporate account, and let the profile load. Leo sat next to her, staring at his now-quarantined laptop
The backdoor activated. But this time, Maya’s sandbox was a reverse trap. The trojan reached out to its C2 server, and Maya’s team redirected that traffic back to a decoy database filled with fictional “executive secrets.” “Maya, you need to see this
Leo, loved your talk at BSides on supply chain attacks. FinSecure is building a new purple team. I’ve attached a brief – let me know if you’d be interested. – Sarah
“Impossible,” she muttered. The honey pot was air-gapped from the real network. The only way in was through a specific, heavily monitored gateway.