QC – Holding

CASE STUDY

QC Holdings

How a leading alternative financial services organization made the move to eSentire MDR to achieve improved threat detection and response and a single pane of glass view across their entire Microsoft environment.

 

The Organization

QC Holdings is a leading alternative financial services organization that provides short-term lending to small businesses and individuals. The firm offers financial services and products at 250 retail locations across the United States and Canada. With 30+ years in retail consumer finance, QC Holdings has built a reputation as a reliable short-term lender for underserved customers.

  • Cloud-native infrastructure built on Microsoft Azure
  • 1300+ endpoints
  • Cybersecurity program overseen by the Director of IT and two security professionals

Solutions and Results

The eSentire Managed Detection and Response (MDR) solution included:

  • MDR with Microsoft Sentinel to provide complete attack surface visibility and drive threat investigations with 24/7 log monitoring.
  • MDR with Microsoft Defender for Endpoint to hunt and isolate endpoint threats before they spread.
  • Managed Vulnerability Service (MVS) to identify, investigate, and remediate vulnerabilities under the guidance of eSentire experts.

Business and Security Outcomes

  • Around-the-clock security event monitoring with 24/7 threat detection, investigation, and response by a dedicated team.
  • Reduced Mean Time to Detect and Mean Time to Contain.
  • Moved from MDR competitor to get improved threat detection and response capabilities, powered by proprietary threat intelligence, runbooks, and AI/ML innovations created by the eSentire Threat Response Unit (TRU).
  • Maximized ROI on Microsoft investment.
  • Improved cyber risk profile and alignment with the CIS Framework.
  • Time to value with rapid service deployment and robust escalation processes to ensure complete response.
  •  

The Challenge

For financial services organizations, a cyberattack can compromise operational systems and expose clients’ sensitive financial data, leading to regulatory fines, lost revenue, and reputational damage. For this reason, continuous improvement of security posture has always been a priority for QC Holdings.

However, with only two in-house cybersecurity staff amidst a team of 30 IT staff, it was impossible for QC Holdings to scale and provide the 24/7 coverage in-house they needed to build a strong security posture. Moreover, budget constraints also meant their IT team would not be able to hire and train additional cybersecurity specialists so outsourcing to an external security provider was a no-brainer.

In addition, the security program at QC Holdings was in its early stages of maturity (i.e., relying on traditional use of firewalls for protection) so they made the decision to implement best practices and controls associated with a specific framework, eventually landing on the CIS Cybersecurity Framework.

“Strategically we knew that we needed to have an MDR provider simply based on the size of our team. The ability to staff a SOC was not in the cards internally coupled with the need to monitor, manage, and respond in real-time when incidents would occur,” says Bill Elvin, Chief Information Officer at QC Holdings. “We needed to get 24/7 coverage as part of our CIS alignment. That alignment required us to have a partner that would review all of the logs, identify problems, notify us, and step in to remediate issues in real-time.”

To bridge their existing security gaps and fulfill the requirements of aligning with the CIS Framework, QC Holdings initially outsourced 24/7 monitoring, detection, and response capabilities to another MDR provider initially.

However, QC Holdings was not satisfied with the quality of proactive 24/7 threat investigation and response capabilities: “We ran into some struggles, specifically around the feedback loop with the provider we’d chosen. It was taking too long to identify problems and they would not step in to remediate.”

In addition to missed alerts and lack of response, the previous MDR provider was not able to integrate with, and manage, the existing technology investments that QC Holdings had made with Microsoft.

“We have significant investment in Microsoft and having to spin up an additional SIEM or storage repository and sending that security data outside of my environment always worried me in our relationship with our previous MDR provider.”

After one year, it was clear to Bill and his team that the provider had not helped them achieve their goals, leading QC Holdings to switch MDR providers.

Given their lack of in-house security expertise, limited access to best-in-class security tools, and healthcare data compliance requirements, they were looking to outsource threat detection and response capabilities to an MDR provider that could offer an all-in-one service that was cost-effective and offered 24/7 SOC-as-a-Service.

Why QC Holdings Switched to eSentire As Their Proven MDR Partner

When the selection process began once again, Bill and his team knew exactly what they wanted from their new MDR provider:

  • 24/7 security monitoring
  • 24/7 threat detection, investigation, and complete response
  • Immediate live support from a SOC Cyber Analyst
  • Seamless integration with their existing Microsoft E5 technology stack
  • Expert-level support and guidance from a trusted partner

eSentire MDR fit their bill of requirements exactly: “One of the big things that we looked for when we chose eSentire was a partner that we could rely on to become an extension of our team.”

Strategically we knew that we needed to have an MDR provider simply based on the size of our team. The ability to staff a SOC was not in the cards internally coupled with the need to monitor, manage, and respond in real-time when incidents would occur.

Bill Elvin

Chief Information Officer, QC Holdings

As a result of partnering with eSentire, QC Holdings benefits from:

Plus, eSentire was able to leverage QC Holdings’ existing investment in Microsoft Office 365 E5, enabling them to consolidate their cybersecurity spend, be cost-effective, and achieve operational efficiencies. eSentire’s ability to manage their Microsoft tool stack internally meant that Bill’s team could worry about one less threat vector while getting more capabilities than they previously had.

“One of the primary capabilities that eSentire brought to the table was to work within our existing environment. eSentire works with the information that’s within the systems, from inside of your system. They’re leveraging our existing investment, and they have access to do what they need to do and keep us informed without additional infrastructure.”

QC Holdings was looking to execute a swift transition to eSentire as their new MDR provider. Rapid onboarding was essential not only to minimize the vulnerability window but also to accelerate the realization of enhanced threat detection and response capabilities.

eSentire facilitated a seamless onboarding process, quickly integrating endpoint and log data for full attack surface visibility and offering immediate time to value.

The onboarding process, as recounted by the team, was straightforward and simple: “Once we chose eSentire to onboarding was relatively straightforward and simple. We were up and getting feedback within a month.”

One key benefit QC Holdings experienced with eSentire was the ability to achieve centralized visibility into their entire environment with Microsoft. This enabled QC Holdings to have a “single pane of glass” view into the entire environment, simplifying the flow of information and improving the quality of threat detection and response.

Where QC Holdings previously struggled to get detailed and timely information about threats from the previous MDR provider, eSentire’s 24/7 SOC became a true extension of their security team, isolating, and remediating threats before they have a chance to disrupt the business.

“When there’s something scary happening within the environment, a single phone call starts the process. I usually get the feedback from our CSM within an hour of initiating the ticket and having analysts start evaluating the problem and resolving it very quickly.”

Lastly, it was crucial for QC Holdings to see the business value of their security investment. eSentire MDR not only leveraged the firm’s existing Microsoft tools but also helped reduce their cyber risk profile and improve their CIS security score, demonstrating a clear ROI.

“One of the things we had to establish early on is the cost-benefit of implementing MDR. We get quarterly business reviews that delve into the business value that eSentire brings to our organization, so it makes the sales job with the executives much easier every year.”

Ready to Get Started?

We’re here to help! Share your details, and we’ll be in touch to discuss how our innovative IT and cybersecurity solutions can drive your business forward.

KidsAbility

CASE STUDY

KidsAbility

A tech refresh offered this non-profit the opportunity to modernize with cost-effective endpoint protection, 24/7 hands-on SOC support, and seamlessly integrate into their existing technology stack.

The Business

KidsAbility is a non-profit organization based in the Kitchener-Waterloo region of Ontario, Canada. With five locations across Ontario, KidsAbility provides 10,000+ special needs children and youth with access to specialized therapy for speech, mobility, and autism.

  • Small team with 4 in-house IT staff and limited budget
  • 350+ therapists serving 10,000+ clients across five regional sites
  • Needed a strategic partner who could provide expert-level 24/7 threat detection and response at an affordable price so their team can focus on what really matters and do more with less

Solutions and Results

eSentire MDR provides 24/7 security event monitoring as well as threat detection, investigation, and response, enabling KidsAbility to:

  • Adhere to PHIPA compliance requirements and ensure their clients’ protected health information (PHI/ePHI) remains secure.
  • Get seamless integration with existing technology stack and easily deploy eSentire MDR for Endpoint solution across 400+ endpoints without service disruption.
  • Shift from a reactive to a proactive cybersecurity approach and stay ahead of the evolving threat landscape.
  • Implement enterprise-level cybersecurity protection to prevent ransomware attacks and reduce cyber risks at a fraction of the cost.

Business and Security Outcomes

  • 24/7 threat detection, investigation, and response capabilities by a team of SOC Cyber Analysts and Elite Threat Hunters
  • Achieve compliance with healthcare data regulations
  • Trusted expert-level guidance to analyze their security measures and rapidly deploy eSentire MDR services
  • Reduce cyber risk by ensuring complete visibility and a consistent security posture across environment

The Challenge

Given that patients’ medical records can elicit 50x more revenue compared to financial records on the Dark Web, it’s no surprise that healthcare delivery organizations (HDOs) have proven to be highly attractive targets for cybercriminals.

For a non-profit organization like KidsAbility, whose staff store, maintain, and transmit personally identifiable information (PII) and protected health information (PHI/ ePHI) of their clients, it’s of utmost importance that they be able to protect their sensitive data from threat actors.

KidsAbility’s primary challenge was to ensure that the PII and PHI/ePHI stored and transmitted through their environment remains secure and that the non-profit adhere with the PHIPA compliance regulations, as mandated by the Ontario government. However, PHIPA compliance was not their only concern.

With only four in-house IT staff, the KidsAbility team was stretched incredibly thin despite having engaged a Managed Security Provider (MSP) that only monitored their environment without offering real response capabilities.

Moreover, the MSP provided monthly reports that flagged critical alerts of suspicious activity related to admin and user behavior or password usage concerns, leaving the KidsAbility team to handle threat investigations and response on their own. Unfortunately, a 30-day delay in receiving these alerts also meant that KidsAbility was forced to take a reactive approach to their cybersecurity, making them a vulnerable target for cyberattacks.

Lastly, since KidsAbility is a non-profit organization with limited budget, they didn’t have the resources needed to hire and train a cybersecurity specialist in-house. Plus, having experienced a ransomware incident first-hand, Tom Szozda, Manager of Information Services at KidsAbility, wanted to engage a leading cybersecurity firm that could provide his team with peace of mind knowing they were protected from day one.

Given their lack of in-house security expertise, limited access to best-in-class security tools, and healthcare data compliance requirements, they were looking to outsource threat detection and response capabilities to an MDR provider that could offer an all-in-one service that was cost-effective and offered 24/7 SOC-as-a-Service.

Why KidsAbility Chose eSentire As Their Proven MDR Partner

After partnering with a new MSP, FoxNet Inc. in 2023, KidsAbility began their search for a trusted MDR partner who could offer the security expertise his team needed to reduce their cyber risks, achieve PHIPA compliance, and build a robust cyber strategy.

Moreover, being a non-profit meant that it was integral for KidsAbility to choose a security firm who could collaborate with FoxNet to deliver an all-encompassing, bundled cybersecurity package. Luckily, eSentire was able to do just that: “Being a non-profit center, cost is huge for us. We have limited funds, and we have to spend it very wisely,” Tom says. “When we heard from FoxNet that eSentire was one of their partners, I was excited. I knew of eSentire [from my previous role] and knew that they’re a world-renowned organization.”

As part of the selection process, KidsAbility also attended a Security Operations Center (SOC) Tour, during which they were impressed by the number of SOC Cyber Analysts present in one shift and the level of 24/7 support our SOC offers.

To help KidsAbility reduce their cyber risks and achieve PHIPA compliance, we delivered:

  • eSentire MDR for Endpoint provided KidsAbility with 24/7 threat detection, investigation, and response capabilities to safeguard against cyberattacks, best-of-breed CrowdStrike endpoint technology, and access to world-renowned threat intelligence expertise.

Throughout the partnership, eSentire has played an integral role in how we protect KidsAbility from security incidents, providing real-time alerts of suspicious behaviour and containing the incident before notifying the KidsAbility team.

“With the team that we have, we wear a lot of hats, but we don’t have expertise in cybersecurity,” Tom states. “With eSentire, we have an active agent on our infrastructure that’s being monitored 24/7 and if any incident occurs, we are notified immediately. We don’t have to be sitting there trying to figure out what we’re supposed to do.”

This has allowed their team to feel peace of mind knowing that they’re protected no matter what: “My team has their hands full – they don’t need to be looking through event logs, emails, or find out if we’ve been compromised. We’re counting on eSentire MDR for Endpoint with 24/7 monitoring to have our backs.”

Another significant concern for Tom was the ease of deployment and implementation of the eSentire MDR for Endpoint solution across 350+ endpoints without their therapists experiencing any service disruption.

“A big concern I had was how easy the implementation would be. It was key for us to deploy efficiently for our therapists since they’re not always on-site,” Tom says. “My team worked very well with eSentire’s SOC and the deployment through our 350+ staff was fairly easy. Within a month or two, everything was protected.”

Complicating matters further, KidsAbility had signed a three-year contract with another security firm for antivirus (AV) protection, security awareness training, and mobile device management. However, eSentire was able to seamlessly integrate with their existing technology stack to provide robust coverage across their entire environment.

We’ve been notified by eSentire sometimes weeks before we get the Cyber Security Ontario notifications of what’s happening [in the threat landscape]. So, they’re ahead of the game and knowing that gives us more peace of mind that we’re working with the right organization.

Tom Szozda

Manager of Information Services, KidsAbility

Conclusion

It should be of no surprise that healthcare organizations have proven to be high-value targets for cybercriminals and the financial cost associated with data breaches or ransomware attacks is astronomical. In fact, healthcare data breach costs have increased 53.3% since 2020 to an average of $10.93 million USD.

By outsourcing their security monitoring and threat detection, investigation, and response to our 24/7 SOC Cyber Analysts and Elite Threat Hunters, KidsAbility’s small but mighty in-house team can focus on their actual day-to-day role without being inundated with delayed alerts. Instead, they can trust that eSentire will act on their behalf to contain and remediate the threat before notifying them of the activity and work with them to determine if any other steps need to be taken.

As a result of switching to eSentire MDR, KidsAbility has benefitted from receiving enterprise-level cybersecurity protection with a cost-effective approach.

“Even our board was very pleased with the outcomes we’ve achieved, as were the senior leadership team,” Tom states. “They trust us to deliver the solution we need to protect our organization.”

Ready to Get Started?

We’re here to help! Share your details, and we’ll be in touch to discuss how our innovative IT and cybersecurity solutions can drive your business forward.

Hexagon

CASE STUDY

Hexagon

How Hexagon unified their fragmented security operations and consolidated their security stack with eSentire’s 24/7 SOC-as-a-Service to achieve 24/7 threat detection and response capabilities and improve visibility across their attack surface.

The Organization

Hexagon is a global leader in digital reality solutions, integrating sensor, software, and autonomous technologies to empower customers across various industries. They specialise in harnessing data to boost efficiency, productivity, quality, and safety in industrial, manufacturing, infrastructure, public sector, and mobility applications

  • Global presence with 26,000+ employees and limited security resources
  • Security operations spread across eight siloed business units with distinct security tooling and processes
  • Compliance requirements for 18 different global security certifications including the Essential Eight, Cyber Essentials, NIST, CMMC, DFARS 7012, ISO 27000, and more
  • Looking for expert-level guidance to identify and address gaps in their security program and leverage existing endpoint technology investments

Solutions and Results

Hexagon partnered with eSentire to consolidate and streamline their security operations, enhance visibility across their attack surface, and reduce threat detection gaps with 24/7 SOC-as-a-Service, including:

Business and Security Outcomes

  • 24/7 threat detection, investigation, and response capabilities with eSentire’s global SOC operations
  • Best-of-breed security tooling and standardised processes across Hexagon
  • Achieve seamless integration with existing Microsoft security tools
  • Maintain compliance with 18 global security certifications
  • Improved visibility and reduced threat detection gaps across the organisation
  • Alignment of cybersecurity strategy, business objectives and risk through a dedicated eSentire Cyber Risk Advisor

The Challenge

Over the past few years, devastating cyberattacks targeting the software supply chain have crippled business operations for thousands of organisations, costing them tens of millions in lost business revenue, cyber insurance, legal fines, loss of customer loyalty, and diminished brand reputation.

Hexagon’s journey towards consolidating their security operations began with significant hurdles. As a global enterprise with a presence in 60 countries, they operated through eight divisions, which sat on top of four different IT networks that operated in silos. Each IT network functioned like an independent enterprise, with their own CIOs, separate security teams, set of vendors, and independent processes.

This led to a fragmented and inefficient security environment with multiple and disparate endpoint, network detection and SIEM solutions. This lack of cohesion posed serious risks, as inconsistent security measures left gaps in threat detection and response. As a result, the organisation wanted to move towards a One Hexagon approach so they could be more efficient and optimise their overall processes.

Moving into the One Hexagon model also meant they would have to shift from a 20/5 coverage model to a 24/7 coverage model. Unfortunately, running a global Security Operations Center (SOC) is complex and requires 12-15 people, at minimum.

Steve Lorimer, Group Privacy & Information Security Officer at Hexagon, recognized the challenge of building an internal SOC team that could not only provide 24/7 coverage but had the expertise to stay on top of sophisticated cyber threats.

“Maintaining a team with high skills, and keeping that skill set current is very, very complicated if you’re going to do it in-house and build it from scratch,” Steve says. “eSentire can bring that service to us, and we can benefit from the shared and the collective knowledge of the team. We needed a company that could match us at a global scale.”

With so much at stake, limited in-house cybersecurity expertise, and the critical need to comply with 18 global security certifications and regulations, Hexagon wanted a trusted partner who could quickly and seamlessly integrate with their team to provide expert-level guidance and comprehensive security coverage.

In addition, Hexagon had already made significant investments in technology so they needed a partner who could leverage and maximise their existing investments in Microsoft E5 and Sentinel and help them consolidate their security tools.

Why Hexagon Chose eSentire As Their Proven MDR Partner

The search for a proven Managed Detection and Response (MDR) solution to complement their shift towards a global security approach led Hexagon to eSentire. The decisive moment came during a tour of eSentire’s SOC facility, which showcased our robust capabilities, deep breadth of expertise, and proactive approach to threat detection and response.

Steve Lorimer was impressed by the level of engagement and expertise at every level of interaction.

“We’ve always felt that at every level across the business, from the executives to the technical guys speaking with the SOC Analysts, there’s a one-to-one working relationship across the board. So, it is very much a partnership with multiple layers of communication all the way through.”

Steve Lorimer
Group Privacy & Information Security Officer, Hexagon

As a result of outsourcing security operations to eSentire, Hexagon also experienced another key benefit: complying with a set of 18 complex, global security frameworks, including NIST, CMMC, DFARS 7012, ISO 27000, Essential 8 in Australia, and Cyber Essentials in the UK.

“Having 24/7 fully monitored SOC alerting us when we have incidents meets many of the controls within those set of frameworks that we have to adhere to,” Steve adds.

Moreover, Hexagon’s priority has also been to standardise their technologies, support tools, and the processes they had in place. Their decision to choose eSentire MDR was further reinforced by eSentire’s ability to seamlessly integrate with their existing technology, providing a unified, robust security framework.

“eSentire is helping us drive down 24/7 monitoring, 24/7 alerting on our networks, and solidify our team,” Steve says. “It’s enabling us to really move our processes much closer to the technology so we can standardise them.”

By choosing a provider that can leverage existing tools, Hexagon was able to consolidate and reallocate their budget to support the global security operation, accelerating them towards One Hexagon.

“What we’re trying to do is not necessarily reduce the spend, but it’s optimise the spend and put better spend into places where we need it.”

Through daily stand-ups, biweekly syncs with Hexagon’s leadership team, and continuous communication, eSentire has become an integral part of Hexagon’s team, delivering consistent support and expertise.

Conclusion

Hexagon’s strategic partnership with eSentire enabled the company to shift away from a divisional security approach and towards the One Hexagon approach. In doing so, they were also able to transition from a reactive to a proactive security stance, ensuring robust protection across its global operations.

By centralising their security operations, and standardising tooling and processes, Hexagon has achieved enhanced visibility, improved threat detection and response capabilities, and a streamlined security posture. This partnership showcases the power of proven, expert-led, 24/7 security solutions in safeguarding complex, dynamic enterprise environments.

Steve Lorimer emphasises the transformative impact of eSentire’s 24/7 SOC-as-a-Service, “As threats and new attack patterns emerge, we’re being protected from the very start.”

Ready to Get Started?

We’re here to help! Share your details, and we’ll be in touch to discuss how our innovative IT and cybersecurity solutions can drive your business forward.

Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2

Blog

How to Cut Through the Noise and Understand MDR Pricing

BY eSentire Threat Response Unit (TRU)

 

November 14, 2024 | 13 MINS READ

Attacks/Breaches

Threat Intelligence

Threat Response Unit

TRU Positive/Bulletin

Want to learn more on how to achieve Cyber Resilience?

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes.

We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.

Our Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced Threat Analytics driven by our Threat Response Unit – the TRU team.

In TRU Positives, eSentire’s Threat Response Unit (TRU) provides a summary of a recent threat investigation. We outline how we responded to the confirmed threat and what recommendations we have going forward.

Here’s the latest from our TRU Team…

What did we find?

In October 2024, the eSentire Threat Response Unit (TRU) responded to an incident where a software developer downloaded a JavaScript project that contained BeaverTail malware. Upon installing the project through the Node Package Manager (NPM) command, it executed malicious JavaScript files and subsequently deployed the InvisibleFerret malware to the host. The InvisibleFerret malware was executed through a Python command, which fingerprinted the host’s information and stole the browser’s credentials.

In response, our team of 24/7 SOC Cyber Analysts responded by isolating the impacted host and alerting the customer with the relevant details.

Upon further investigation by eSentire’s TRU team, it was determined that the observed Tactics, Techniques, and Procedures (TTPs) were consistent with those reported to be used by North Korea threat actors, also tracked as Contagious Interview.

Initial Access

A ZIP file named ‘task-space-eshop-aeea6cc51a7c.zip’ was found in the user’s download directory. eSentire Threat Intelligence team assesses the chances as probable that the victim downloaded the zip from a BitBucket project named “eshop” (Figure 1).

Figure 1 eshop project hosted on Bitbucket.

 

The malicious “eshop” repository was committed by the user “francesco zaid” (Figure 2).

Figure 2 Author “francesco zaid” (screenshot taken October 24th, 2024).

The commits to eshop occurred roughly five days after a job posting for a freelancer was published on a freelance job board. The job was posted by a user named “francesco zaid” on the “www.freelancermap[.]com” (Figure 3).

Figure 3 Possible Fake Job posting associated with the Contagious Interview Campaign.

It should be noted that the eSentire Threat Intelligence team reviewed the job posting and was unable to find a direct link to the eshop repository from the posting; however, given the contact person’s name being the same name used to upload content to the repository, it is a notable finding and is consistent with the Contagious Interview campaign Tactics, Techniques and Procedures (TTPs) of luring software developers with fraudulent jobs.

The victim in the incident eSentire responded to appears to be a software developer, which aligns with the TTPs of previously reported on campaigns by North Korean threat actors where software developers were targeted.

Execution Chain

The ZIP file downloaded by the victim contained a malicious NPM package that once installed by the victim, executed “server.js” file that is defined in the “package.json” and subsequently, loads a malicious JavaScript file (error.js) (Figure 4).

Figure 4 “server.js” file was defined to be executed in the “package.json” file

The “server.js” file is used as an entry point to load the file located in “backend/middlewares/helpers/error.js”, which facilitates further malicious activities on the victim machine such as: steal saved login credentials in the browsers; collect system information; enumerates crypto wallet extensions in the targeted browsers; and, steal configuration data from crypto wallets like Exodus and Solana. This JavaScript file (error.js) is highly obfuscated and after analysis it was determined to be a component for the Beavertail malware (Figure 5).

Figure 5 Screenshot of ‘error.js’ found on the BitBucket Repository that is a component of BeaverTail.

After the JavaScript file is loaded, it uses a cURL command to download InvisibleFerret malware components from a command and control (C2) server; in this case the C2 was located at 185[.]235[.]241[.]208[:]1224. BeaverTail then downloads the initial Python script of InvisibleFerret. It is saved on the victim machine as “.sysinfo” file in the victim’s home directory (Figure 6).

Figure 6 Initial BeaverTail Python Script that Fetches InvisibleFerret.

Once the file “.sysinfo” is downloaded onto the machine, InvisibleFerret’s loader file “.sysinfo” is then executed with the command “C:\Users\{username}\.pyp\python.exe” “C:\Users\{username}/.sysinfo”. It’s worth noting that this observation is different from what was reported by Unit 42 where the initial Python script was named “.npl”.

It’s also worth noting that a total of 21 crypto extensions were targeted by the BeaverTail in our observed sample; the full list can be found in the Appendix at the end of the blog (Figure 7).

Figure 7 Crypto Wallet Browser Extensions Targeted by BeaverTail.

Analysis of InvisibleFerret Python Files

The eSentire Threat Intelligence team conducted analysis of four Python files that were dropped in the incident; one loader (.sysinfo in this instance) and three payloads stored under “\.n2” folder in the user’s home directory (Figure 8).

Table 1: Observed Invisible Ferret Python File Locations

Loader Component Overview

Figure 8 Python Loader (.sysinfo) Parameters (commented line was included).

It’s worth noting that the internal IP address (10.10.51.212) was excluded from the initial loader script, but still reappears in the various InvisibleFerret python payloads (Figure 8). This suggests that the IP address may be used for testing purposes. Furthermore, our analysis revealed that excluded or commented-out code sections are a common trait of these scripts, potentially indicative of the malware’s development or testing stages.

The sample downloads three distinct payloads which are appended with a campaign ID and sub ID (sType and gType respectively, as seen in Figure 8 above and Figure 9 below): pay_campaignid_subid.pybrow_campaignid_subid.py; and, mlip_campaignid_subid.py. On disk these files are saved to the %USERPROFILE%\.n2 path without these identifiers or file extensions (Figure 9).

Figure 9 InvisibleFerret Python Files.

Some of these files are obfuscated with a combination of zlib, base64 and reverse string order (Figure 10). The script loops through the lambda function continuously until the final cleartext payload is executed.

eSentire Threat Response Unit (TRU) 

The eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.

Read the Latest from eSentire

ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?

Call 1-866-579-2200

How to Cut Through the Noise and Understand MDR Pricing

Blog

How to Cut Through the Noise and Understand MDR Pricing

BY Greg Crowley

November 25, 2024 | 15 MINS READ

Managed Detection and Response

Cybersecurity Strategy

Want to learn more on how to achieve Cyber Resilience?

Managed Detection and Response (MDR) pricing can be challenging to navigate. Many security vendors often play into fears of ransomware attacks, data breaches, and costly regulatory penalties, which can push security leaders into rushed decisions, creating a sense of urgency.  

As a result, you may find yourself committing to contracts or service levels that do not fully meet your organization’s specific needs even though they appeared on paper to provide the level of detection and response your organization needs. 

Unfortunately, the challenge doesn’t stop there. Many Managed Detection and Response (MDR) offerings sound nearly identical, with vendors touting similar capabilities: 24/7 Security Operations Center (SOC) coverage, proactive threat hunting capabilities, and advanced threat detection tools. While these claims may appear straightforward on the surface, they mask a deeper level of complexity.  

One example where we see this is when fake MDR vendors interpreting terms like “24/7 monitoring” and “threat response” in different ways. For instance, a vendor can promise round-the-clock monitoring to mean a fully staffed SOC with experienced analysts on each shift.  

Meanwhile, another vendor might have junior analysts (or worse, high turnover rates in their SOC staff) with limited incident handling experience, which can lead to missed alerts and limited response when you need it most. 

As a security leader, you’re also faced with deciphering vague or inconsistent information presented in proposals and demos. In many cases, these demos show premium-tier features that may not be included in lower, more cost-effective service tiers. This lack of transparency can lead to assumptions about service quality and capabilities that don’t align with the actual contract.  

The result? A misalignment between the expected and delivered service, with potential gaps in coverage, missed alerts, limited incident response, or a lack of proactive threat hunting. 

In this blog, we aim to help you understand the MDR capabilities you actually need, how to look out for hidden costs in the MDR contract, and help you evaluate MDR offerings based on tangible outcomes rather than vendor promises.  

Understanding MDR Capabilities: What Do You Really Need? 

Before engaging with MDR vendors, it’s essential to clearly define what problems your organization is trying to solve. MDR security solutions aren’t one-size-fits-all; the right provider for your organization will be the one that aligns best with your specific security challenges and strategic goals. 

1. Identify Your Core Problems 

Start by pinpointing the main security pain points your organization faces: 

  • Are there gaps in compliance that need addressing related to sensitive customer data or proprietary data?  
  • Are you exposed to supply chain and third-party vendor risk? 
  • Do you have limited real-time visibility across your endpoints, or is your security team struggling to monitor alerts during off-hours, such as weekends and nights?  

Understanding these gaps will shape the list of must-have features in your MDR service. 

2. Define Your Key Cyber Risks 

Identify the critical cyber risks you’re looking to mitigate. For some organizations, this could mean protecting against ransomware and other malware threats, while others may need a solution focused on phishing, insider threats, or regulatory compliance.  

A risk-based approach ensures that the MDR service you select is equipped to handle the specific threats that are most relevant based on your unique attack surface, your industry and business operations. 

3. Establish Clear, Measurable Outcomes 

The ability to measure outcomes is crucial for evaluating the effectiveness of an MDR service. Having tangible goals will guide your discussions with potential vendors and prevent you from being swayed by extraneous features that don’t serve your core objectives. Examples of measurable outcomes include: 

  • Reduced Mean Time to Detect (MTTD): A critical metric that reflects how quickly threats are identified. A practical outcome should go beyond just reducing MTTD; it should include the ability to know your organization’s current MTTD and Mean Time to Investigate (MTTI). This baseline helps you assess the improvement brought by an MDR provider. 
  • Investigate Security Alerts 24/7: If your in-house team is limited to having coverage only during business hours, make sure your MDR provider can extend this with continuous monitoring and investigation capabilities. 
  • Operationalizing Threat Intelligence: The MDR provider should help your in-house team move from passive monitoring to proactive, hypothesis-driven threat hunting by integrating original threat intelligence.  
  • Enhanced Incident Response Capabilities: Evaluate whether the MDR provider can augment your existing incident response processes. Will they support automated response actions, containment, and isolation, or will they simply notify your team and leave the work to them? Clarifying these expectations will help ensure that the service matches your operational requirements. 

Establishing these defined outcomes ahead of time will make your evaluation process more straightforward and help you ask better questions during vendor discussions.  

Clarifying the MDR Service Tier Structure 

MDR services are typically offered in multiple tiers, ranging from basic to premium, with each tier offering varying levels of service. This tiered approach allows MDR vendors to cater to different types of customers, from smaller organizations that need essential coverage to large enterprises that require comprehensive and proactive services.  

However, it’s important for security leaders to understand that not all tiers are created equal. The service level you choose can significantly affect your security outcomes. 

Premium tier packages often include multi-signal coverage (endpointnetworklogcloudidentity),  24/7 SOC-as-a-Service, advanced threat hunting, unlimited incident handling, and rapid incident response. While these offerings may be showcased during demos, lower-tier packages frequently lack these comprehensive features.  

Instead, they may only offer basic alerting or monitoring capabilities, which could mean that threats are detected but not actively managed or mitigated. Therefore, make sure you’re asking critical questions like: 

  • SOC Coverage: Does every tier provide the same 24/7 SOC Cyber Analyst coverage? Vendors may claim continuous monitoring, but in lower-tier services, this might only mean alerts are forwarded to your team without a thorough investigation. Also, you should clarify if Level 1 to Level 3 SOC Analysts are on duty around the clock or if they are only available in certain higher-tier plans. 
  • Threat Hunting and Response: What level of proactive threat hunting and response actions is included at each tier? For instance, some vendors may restrict key response actions (e.g., isolating compromised systems or network segments) to their more expensive tiers. Make sure you know if lower-tier services are limited to merely alerting your team while leaving the response to you. 
  • Scope of “Managed” Services: Understand what “managed” means across different tiers. While top tiers might provide comprehensive management of incidents—from detection to resolution—basic tiers might only offer minimal monitoring or advisory support. 
  • Best-of-Breed Endpoint Technology Partners: Do they partners with leading technology providers such as CrowdStrike, Microsoft, SentinelOne, Sumo Logic and Tenable? If you want to leverage your existing security investments, find out what technology integrations they offer with your existing tools and SaaS platforms. 
  • Dashboards and Reporting: Does the tier you’re considering include access to a customer portal or dashboard, continuous threat intelligence updates, regular updates, asset risk or cyber risk scores? While these may be impressive, they’re often part of higher-tier packages so ask for a clear breakdown of the features and services included at each service level.
    • Request specifics on the frequency of reports and whether you’ll have access to dedicated analysts or customer success managers. For example, premium packages might offer monthly or quarterly review sessions, whereas lower tiers might only provide an annual review, if at all. 

Lastly, ensure that you fully understand what each tier offers and verify that the package aligns with your organization’s specific requirements. If your organization needs fast response time to contain incidents or needs advanced threat intelligence capabilities, a basic tier may not suffice.  

Be proactive in comparing your security needs to what each tier truly offers to avoid mismatched expectations and service limitations. 

By asking detailed questions and pushing for transparency, you can gain a clearer picture of how well an MDR provider’s tiered services align with your security goals. This step ensures that you’re not left under protected or overpaying for features that don’t match your needs. 

Differentiate Between MDR Vendors by Getting Specific 

Terms like ‘24/7 SOC’ or ‘fully managed service’ can sound reassuring but often lack a standardized definition across vendors. To avoid misunderstandings and ensure that the MDR provider can meet your organization’s needs, it’s crucial to ask for specifics when you compare MDR vendors.  

Here are some examples where you need to get specific with your vendor as you begin the evaluation process: 

  • SOC Capabilities: When vendors promise 24/7 coverage, it’s essential to clarify exactly what that involves. Will you have a complete team of Tier 1-3 Analysts available and actively monitoring on every shift, or are there limited resources during certain hours? Are Incident Handlers staffed on every shift? Some providers may only have a skeleton crew or use on-call analysts outside of core business hours, which can significantly impact response time and quality during a critical event. 
  • Service Level Agreements (SLAs): Get clear definitions of key metrics like Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), and Mean Time to Investigate (MTTI). These metrics are vital for assessing the effectiveness of an MDR provider, but their calculation methods can vary. For example, one vendor may start the clock as soon as an alert is generated, while another may only count time once an analyst begins investigating. Understanding these nuances will help both parties set accurate expectations for performance and accountability. 
  • Ask How Metrics Are Calculated: Clarify exactly how MTTD, MTTR, and MTTI are measured. This ensures that you can compare different MDR services accurately and know what level of response you’re paying for. Providers that report faster detection and response times may be using different methodologies that skew the data, so it’s important to dig into these details. 
  • Proof of Service: Request sample reports and dashboards that align with the specific tier you are considering. Sales demos often highlight the most comprehensive features, which might not be part of your chosen package. Seeing real examples of reports and dashboards can help you understand what kind of visibility, analysis, and reporting you’ll receive. 
  • Threat Hunting Availability: Verify whether threat hunting services are available 24/7 or if they are limited to standard business hours. Proactive threat hunting can be a game-changer in identifying sophisticated attacks before they escalate, but some vendors may only include it as part of higher-tier plans or limit its availability to daytime hours. 
  • Response Time Nuances: Ask vendors whether their stated response times are consistent across all days, including weekends and holidays. For example, a vendor might claim a 15-minute response during business hours but have much longer response windows during weekends or late-night shifts. This variability can be a significant factor during high-stress incidents where every minute counts. 
  • Threat Intelligence (TI) Updates and Novel Detections: Ask vendors how frequently they update their threat intelligence and how many novel detections they make on a monthly or quarterly basis. Vendors that regularly refresh their TI and develop novel detection methods are better positioned to catch advanced threats that generic systems might miss. This proactive capability can be a major differentiator in a crowded market. 
  • Integration with Your Existing Security Stack: It’s essential to clarify how well an MDR service can integrate with your existing security stack. Ask whether the vendor supports seamless integration with your current tools and if there are additional fees or technical limitations for such integrations. The ability to integrate without significant custom development can save both time and money while ensuring more comprehensive protection across your network. 

Look Out for Hidden Costs in the Pricing Models 

While many providers may advertise straightforward pricing, the details often reveal additional charges for critical services that may not be included in the base package.  

To avoid surprises, review the fine print and confirm all aspects of the pricing model before signing a contract. This approach ensures you have a complete understanding of what you’re paying for and helps prevent unexpected costs or service gaps when it matters most. 

Pitfall #1: Multi-Year Contracts and Flexibility  

While some MDR vendors offer attractive discounts for committing to multi-year contracts, you should evaluate whether locking in for a longer period is truly beneficial for your organization. Some MDR vendors may not offer flexibility so if your needs change, you may find yourself stuck in the same agreement until it expires.  

So, if you’re signing a multi-year agreement, make sure that the MDR vendor offers flexibility and can scale with your business.  

Pitfall #2: Hidden Add-ons 

Carefully review what is included in the base package versus what incurs additional fees. While core MDR services might be covered, essential features such as unlimited log ingestion, custom rule development, or advanced threat hunting often come at an extra cost.  

These features can be crucial for organizations that need deeper insights or more tailored threat detection, so it’s vital to have clarity on what is covered upfront. 

Pitfall #3: Scope of Incident Response (IR) Retainers 

Some MDR providers include an IR retainer as part of their service, which guarantees a callback in the event of an incident but does not necessarily ensure a comprehensive response. This type of retainer may only offer initial consultation or triage, leaving full remediation and recovery to your internal team or requiring an additional fee.  

Verify the scope of these retainers to understand what level of response is included and whether it aligns with your expectations. 

Pitfall #4: Breach Response Limitations 

MDR vendors often claim to offer breach response services, but the specifics can vary widely. Some providers may assist with containment and initial guidance but stop short of full incident management and recovery. Knowing the limits of their responsibility is crucial, especially in high-stakes scenarios where quick action can make the difference between containment and widespread damage.  

Ask detailed questions about what their response includes—do they handle eradication and system restoration, or will they leave those steps to you? 

Red Flags to Watch for During the Sales Process 

When evaluating potential MDR providers, it’s important to be aware of sales tactics that can lead to unexpected costs or unmet expectations. Recognizing these red flags early can save your organization from choosing a service that doesn’t align with your security needs or budget. 

  • Fear-Based Selling (FUD): Be cautious of vendors that lean heavily on fear, uncertainty, and doubt (FUD) to push you into making a quick decision. These tactics might involve emphasizing the dangers of ransomware attacks, the potential for data breaches, or the hefty penalties associated with non-compliance. Stay grounded by focusing on objective evaluations and measurable outcomes. 
  • Beware of “Free” Add-ons: Some vendors may offer enticing “free” add-ons, such as breach warranties or additional threat intelligence services, to make their packages seem more comprehensive. However, these add-ons often come with limitations or fine print. For example, a breach warranty might only cover certain types of incidents or require you to purchase additional services to activate the warranty. Always ask for the full terms and conditions of any “free” offering, and make sure you understand MDR breach protection warranties, to ensure there are no hidden costs or restrictions. 
  • Vague Promises on 24/7 Monitoring: Vendors often push features like 24/7 monitoring and rapid response times, but these promises can be misleading if not clearly defined. Without specifics, “24/7 monitoring” could mean basic alert forwarding rather than continuous, in-depth analysis by skilled SOC analysts. Always ask for a detailed explanation of what these terms mean in practice and ensure that they align with your organization’s expectations. 
  • Tour the SOC and Meet the Team: Your buying and evaluation process should include an in-person or virtual tour of the vendor’s SOC and meeting SOC leaders. During the sales cycle you should also ask to meet with members of the teams responsible for threat hunting and threat research to get an understanding of how those teams work with customers. 
  • Limitations in Multi-Year Contracts: Ensure that your contract includes flexibility to upgrade, downgrade, or adjust services as your organization grows or shifts its security strategy. Without this flexibility, you could be left paying for a service that no longer meets your requirements or that restricts your ability to pivot when new threats or technologies emerge. 

How to Make an Informed MDR Decision 

Choosing the right MDR provider requires a strategic approach that goes beyond simply comparing price tags. While cost is an important factor, the true value of an MDR service lies in its ability to deliver measurable outcomes and align with your long-term security objectives. 

Begin your evaluation by understanding your organization’s specific needs and defining clear, measurable goals. Focus on whether the provider can support essential outcomes like reducing Mean Time to Detect (MTTD) and responding effectively to threats 24/7. Don’t be swayed by marketing buzzwords or fear-based sales tactics; instead, dig deeper to understand what services and features are included in each tier and how they align with your security strategy. 

When selecting a provider, prioritize those who not only meet your current requirements but can evolve with you as your organization grows. The cybersecurity landscape is constantly changing, and the right MDR partner will adapt to these shifts and offer continuous support. Look for a provider that: 

  • Meets You Where You Are: Ensure they can align with your current security maturity and provide the flexibility to grow alongside your organization as your security needs evolve. 
  • Adds Tangible Value: Assess their ability to provide novel detections and proactive threat hunting that goes beyond basic alerting, adding real value that is measurable to your security efforts. 
  • Delivers Meaningful Metrics and Insights: A top-tier MDR provider will provide metrics and insights that help you manage and fine-tune your security posture, allowing you to make informed decisions and continually improve your resilience. 

The best MDR providers are those that go beyond offering standard services—they become partners who add substantial value through timely intelligence, proactive measures, and customized support. Evaluate whether the provider is committed to delivering meaningful, actionable metrics and reports that empower your team to stay ahead of threats and maintain a strong defense. 

Informed decision-making means choosing an MDR service that not only provides comprehensive protection today but also positions your organization for sustained security and growth in the future.  

By taking the time to thoroughly vet potential vendors, ask the right questions, and assess long-term compatibility, you can ensure that your investment in MDR strengthens your security capabilities and supports your resilience in an ever-changing threat landscape. 

To learn how eSentire MDR can help you reduce your cyber risk and build cyber resilience, contact an eSentire Cybersecurity Specialist now.  

Greg Crowley Chief Information Security Officer

Greg Crowley is an accomplished executive with over 20 years in Information Technology and Cybersecurity with extensive experience in managing enterprise security and mitigating risk for global hybrid networks. Greg believes that as a leader in the cyber world, being able to communicate and execute a strategic vision to defend and protect is the most important part of his role. Prior to joining eSentire, Greg oversaw the overall cybersecurity function as Vice President of Cybersecurity and Network Infrastructure at WWE (World Wrestling Entertainment). He spent over 17 years in various leadership roles across engineering, infrastructure and security within that organization. Greg holds a Bachelor’s degree from Queens College. He is a Certified Information Security Manager (CISM) and a Certified Information Systems Security Professional (CISSP).

Read the Latest from eSentire

ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?

Call 1-866-579-2200

20+ Questions To Ask When You’re Evaluating an MDR Service Provider

Guide

20+ Questions To Ask When You’re Evaluating an MDR Service Provider

Download Now
Set reCAPTCHA Site and Secret Keys in JupiterX Settings .

In the latest Managed Detection and Response (MDR) market Gartner guide, it is estimated that there are now over 200 MDR service providers globally. With so many MDR providers and variations of what they provide, many organizations are asking themselves, “What is true MDR and how do I select the right MDR service provider for my organization?”

The questions in this guide are applicable to any MDR provider regardless of the variation of MDR they deliver. This guide should serve to qualify or disqualify a potential MDR service provider from consideration in relation to their ability to deliver against your unique MDR requirements. Organizations considering an MDR service provider are encouraged to ask for customer references, visit in person or participate in virtual Security Operations Center tours, participate in demonstrations of delivery in real-world scenarios and poll peers as well as industry analysts for experiences with MDR provider satisfaction. 

Read this MDR service provider guide to learn:

  • The definition of Managed Detection and Response

  • The five recurring challenges and measurable components that MDR service providers should address

  • The top questions to help you qualify potential MDR service providers and why they matter

After reading this MDR service provider guide, you will understand what MDR is, what is the right MDR protection for your business, and how to choose an MDR service provider for your organization.

Related Resources

eSentire MDR for Identity

Data sheet / solution brief eSentire MDR for Identity Download Now More attackers use stolen valid credentials to

eSentire Cloud-Native Application Protection Platform (CNAPP)

Data sheet / solution brief eSentire Cloud-Native Application Protection Platform (CNAPP) Download Now Leading organizations are increasingly adopting

MDR for Endpoint

Data sheet / solution brief MDR for Endpoint Download Now Today’s endpoints are located across vast physical and

ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?

Call 1-866-579-2200

Meet the SOC

Video

Meet the SOC

eSentire MDR with 24/7 SOC-as-a-Service

Given that a single successful attempt is all that a cybercriminal needs, your defenses must be foolproof. Therefore, it’s vital to have a dedicated SOC team at your disposal 24/7 who can spring into action without hesitation to manage active threats, efficiently manage escalations, and intervene to prevent further spread.

The eSentire Security Operations Center (SOC) offers comprehensive services that cover everything from initial triage to investigation and remediation actions. If needed, we also escalate to incident response teams or the Threat Response Unit (TRU).

Our 24/7 SOC Cyber Analysts are an extension of your team and will pick up the phone to provide immediate expertise, peace of mind, and hands-on assistance to remediate threats on your behalf when and where you need it.

Watch this video to get an inside view on how the 24/7 eSentire SOC operates to stop the most advanced cyberattacks before they disrupt your business.

Related Resources

Managed Detection and Response for AWS

Data sheet / solution brief Managed Detection and Response for AWS Download Now eSentire is a member of

Technical Testing

Data sheet / solution brief Technical Testing Download Now Whether testing prevention, detection or response capabilities for your

Managed Phishing and Security Awareness Training

Data sheet / solution brief Managed Phishing and Security Awareness Training Download Now eSentire’s Managed Phishing and Security

Managed Vulnerability Service

Data sheet / solution brief Managed Vulnerability Service Download Now Your network is an ever-expanding ecosystem of dynamic

eSentire Dark Web Monitoring

Data sheet / solution brief eSentire Dark Web Monitoring Download Now The Dark Web is an important hub

QC – Holding

CASE STUDY QC Holdings How a leading alternative financial services organization made the move to eSentire MDR to

ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?

Call 1-866-579-2200

Managed Detection and Response

Data sheet / solution brief

Managed Detection and Response

Not all MDR is created equal. eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Team eSentire’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.

With eSentire MDR, you get:

  • 24/7 Always-on Monitoring
  • 24/7 Live SOC Cyber Analyst Support
  • 24/7 Threat Hunting
  • 24/7 Threat Disruption and Containment Support
  • Mean Time to Contain: 15 minutes
  • Machine Learning XDR Cloud Platform
  • Multi-signal Coverage and Visibility
  • Automated Detections with Signatures, IOCs and IPs Security Network Effects
  • Detections mapped to MITRE ATT&CK Framework
  • 5 Machine Learning patents for threat detection and data transfer
  • Detection of unknown attacks using behavioral analytics
  • Rapid human-led investigations
  • Threat containment and remediation
  • Detailed escalations with analysis and security recommendations
  • eSentire Insight Portal access and real-time visualizations
  • Threat Advisories, Threat Research and Thought Leadership
  • Operational Reporting and Peer Coverage Comparisons
  • Named Cyber Risk Advisor
  • Business Reviews and Strategic Continuous Improvement planning

Read this data sheet to learn more about the eSentire Multi-Signal MDR difference and see why we are the Authority in Managed Detection and Response.

Related Resources

MDR for Endpoint

Data sheet / solution brief MDR for Endpoint Download Now Today’s endpoints are located across vast physical and

Managed Detection and Response for AWS

Data sheet / solution brief Managed Detection and Response for AWS Download Now eSentire is a member of

Technical Testing

Data sheet / solution brief Technical Testing Download Now Whether testing prevention, detection or response capabilities for your

ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?

Call 1-866-579-2200