• +48 786 088 383
  • 94-102 Lodz, Nowe Sady 4 lok.14
Ekran z ostrzeżeniem i dokumentami połączony strzałką z hakerem i pieniędzmi, schemat oszustwa. Use case SOC ADQ.

USE CASE #5
LACK OF MONITORING LEADING TO THEFT OF FUNDS FROM THE COMPANY ACCOUNT

TYPE OF ORGANIZATION

A service company operating in a large office building. Like many modern enterprises, the organization uses electronic banking on a daily basis to make payments, and employees connect to the company network via Wi-Fi.

SOURCES OF VULNERABILITY TO ATTACKS

  • The organization used a router with very old and outdated software.
  • The Wi-Fi network did not have adequate security measures in place, and the system did not log events or monitor who connected to the infrastructure and when.
  • The wireless network signal covered not only the office, but also the public common areas in the building, making it accessible to outsiders.

INCIDENT

Neglecting to update the router led to its compromise. Criminals gained unauthorized access to the company network, which became the starting point for a further attack.

Using this connection, the attackers logged into the company's electronic banking system and made a significant transfer to an unknown account.

WHY WAS THE ATTACK SUCCESSFUL?

  • No updates: Working with outdated router software opened the door to attackers.
  • No access control: The Wi-Fi network was open to anonymous connections.
  • No segmentation: once inside the Wi-Fi network, the attacker had free access to other company resources.
  • No monitoring: no one was monitoring network traffic, so the unauthorized connection and suspicious activity went unnoticed until the funds disappeared from the account.

EFFECTS OF THE INCIDENT

  • Direct financial loss: the company lost a significant amount of money as a result of the transfer made by hackers.
  • Lack of evidence: due to the lack of logs, monitoring, and device identification, it was not possible to clearly identify who committed the theft.
  • Suspicions against employees: due to the lack of technical evidence of an external attack, law enforcement agencies considered the involvement of people from within the company, which created a toxic atmosphere within the team.
  • Long-term investigation: the lack of historical data from the network significantly hampered and prolonged the investigation.

THE ROLE OF SOC ADQ: WHAT WOULD CHANGE?

  • Rapid intrusion detection: our team of analysts would immediately notice the anomaly in network traffic and the connection from an unauthorized device.
  • Immediate response: SOC could identify the source of the connection and block the attacker's access, protecting the banking system from compromise.
  • Hard evidence: By collecting logs, the company would have complete documentation of the incident for the police, which would eliminate unfounded suspicion of loyal employees.

KEY CONCLUSIONS:

  • Network and Wi-Fi devices are critical infrastructure components that require constant monitoring.
  • Failure to record events means powerlessness in the face of an attack and the inability to prove the perpetrator's guilt.
  • ADQ monitoring protects your organization and employees from false accusations by providing clear technical evidence.
  • The cost of implementing SOC monitoring is a fraction of the losses a company incurs as a result of a successful bank fraud.

Check your network for leaks free of charge

We start with a free audit: we check whether your infrastructure is ready for monitoring and identify the most important threats.
Use cases

Use cases: how SOC works and when you need it

USE CASE #1

From an outdated smartphone
to mass spam from a company domain

USE CASE #2

How ransomware paralyzed a warehouse
with an outdated ERP system

USE CASE #3

Lack of control over authorizations leading to paralysis of the accounting office

USE CASE #4

One laptop, 200 points of sale,
and total paralysis – how ransomware
brought a nationwide retail chain to a standstill

Our Adress

Nowe Sady 4 lok.14
94-102 Łódź

Call us

+48 786 088 383

Write to us

info@adq.com.pl
© 2026 ADQ Technologies | Wszystkie prawa zastrzeżone