Date of Incident: May 2024
Attack Vector: External Access and Internal Misuse
- Remote access attempts from a China-based IP targeting a user workstation via RDP.
- PowerShell activity launched via powershell_ise.exe with encoded payloads.
- Multiple failed login attempts against local admin accounts.
- Unexplained Netlogon behaviour on a second system.
- Missing telemetry from several endpoints.
With uncertainty growing, internal IT isolated affected systems and requested immediate forensic response through the IR-1 activation portal.
“We had no in-house capability to validate what happened or whether we had truly contained the threat. Blackpanda’s team gave us answers in days — not weeks.”
— CTO, Hong Kong IoT Service Provider
Blackpanda Response & Investigation
Blackpanda launched a multi-endpoint investigation across disk, memory, and logs, decoding PowerShell payloads, reviewing internal login patterns, analysing Netlogon traffic, and auditing endpoint/credential hygiene.
Findings & Outcome
- Encoded PowerShell commands were decoded and reviewed.
- Suspicious internal login patterns suggested internal misuse or compromised access.
- No evidence of malware installation, data exfiltration, or lateral movement.
- Netlogon anomalies were likely from undocumented internal testing.
- Endpoint hygiene and credential policy were rated high-risk.
Conclusion: Threat signals were real, but did not meet breach thresholds.
Cost Comparison: ODIR vs. IR-1
- IR-1 status at time of incident: Not subscribed

ODIR (On-Demand Incident Response)
- US$60,000 (≈120 hours @ US$500/hour)
IR-1 (Hypothetical plan for ~500 endpoints)
- Annual subscription: US$5,000
- Incident coverage: Unlimited (via plan credit)
- Approx. savings vs ODIR in this scenario: ~US$55,000 (≈12x cheaper)
What IR-1 Would Have Delivered
- Instant activation (no procurement friction) with first responder contact guaranteed within 4 hours of report.
- Unlimited IR hours under the plan’s annual credit
- Deep-dive memory & endpoint analysis within 24–48 hours
- Complimentary Attack Surface Readiness (ASR) and response-ready telemetry
Post-Incident Recommendations
Blackpanda provided a future-proofing playbook tailored to the Victim's architecture:
- Centralise and retain security logs across all internal systems.
- Disable PowerShell ISE and restrict script execution to signed files/policies (see Microsoft guidance on script signing and ISE).
- Lock down unnecessary firewall ports and restrict external RDP exposure.
- Document internal tests to avoid confusion during detection/triage.
- Strengthen credential policies and endpoint hygiene.
Why This Case Matters
- RDP abuse remains a dominant entry vector — observed in ~90% of analysed attacks in one large IR dataset.
- PowerShell misuse via encoded payloads and trusted tooling (e.g., powershell_ise.exe) is common; enforcing script-signing and limiting ISE reduces attack surface.
Frequently Asked Questions
Q1. Was this a confirmed data breach?
A. No. The investigation found no evidence of malware, data exfiltration, or lateral movement. Signals were real, but did not meet breach thresholds.
Q2. What triggered the investigation?
A. Repeated RDP login attempts from a China-based IP; PowerShell activity via powershell_ise.exe with encoded payloads; anomalies in Netlogon; and missing endpoint telemetry.
Q3. How quickly can Blackpanda engage during an incident?
A. When reported via the platform, initial responder contact is guaranteed within 4 hours (often faster).
Q4. How is IR-1 different from a traditional IR retainer?
A. IR-1 is a fixed-cost subscription with an activation credit and unlimited DFIR hours under that credit — eliminating unpredictable hourly billing and procurement delays. See: What is Blackpanda IR-1?
Q5. Does IR-1 include Attack Surface Readiness (ASR)?
A. Yes. ASR is included to surface exposed services (e.g., external RDP/VPN) and provide response-ready telemetry that accelerates investigations.
Q6. What immediate controls reduce this kind of risk?
A. Restrict RDP, enforce PowerShell script signing, disable PowerShell ISE where not required, centralise logs, and harden credential/endpoint hygiene.
Q7. How do we report an incident now?
A. Use the IR-1 platform to report and activate response, or contact our team via the emergency response page (links below).