



Fill out an actors and motivations worksheet for each of them to try to think through who was doing what, and why they did what they did.įigure out the attack, and what vulnerability enabled the attack. We’ve got the attackers, the defender (Norton LifeLock), the victim, additional defenders, etc. Let’s go through the same process we have been doing for the last couple of weeks to map out and understand what is happening:įigure out who the relevant actors are. Trust your gut you can always go back and look again later. You’ve read through a number of case studies, and are starting to get a better gut feeling for what information is important and what information isn’t. Start by reading the article I linked above. Let’s use the skills we’ve been developing to understand this case. What happened, who did it, and why did they do it? The first thing you should do is to try to understand the breach. They said they think as many as 925,000 people might have been effected. In January, they notified a number of people who use their Norton Password Manager software that a hacker had gained access to the password manager and was using it to steal people’s usernames, real names, passwords, etc. They also offer services like LifeLock, that is supposed to monitor and see if someone is stealing your identity. They make tools like anti-virus software, password managers, etc. Norton LifeLock is a cybersecurity company that helps people manage their cybersecurity. Week 7 Studio: Norton Lifelock Credential Stuffingįor today’s case study, we are going to look at a breach that was announced last month (January 2023) and happened the month before (December 2022).
