Chapter 7: Containment

When Ari returned to the SOC, nothing looked panicked.

Which was exactly how he liked it.

The SUW team had taken over one side of the room, their screens filled with network telemetry and sandbox environments. Across the aisle, the SOC analysts were updating detection rules in real time.

“Welcome back,” Keren said without looking up.

Ari pulled a chair over. “Status.”

“They took the bait,” she said.

A screen rotated toward him.

The attackers were still active inside the decoy environment. Files were being explored, directories opened, and databases queried.

“Which one?” Ari asked.

Keren smirked.

“The IP database.”

Ari nodded slowly. Targeted. Not random.

“Good to know,” he said.

Another analyst spoke up. “We’re feeding indicators to the SOC. They're pushing detection updates live,” he said.

Across the room, SOC monitors began lighting up as new alert signatures propagated across the company’s systems.

Every new tactic the attackers tried was immediately captured and converted into detection logic. Their methods were now becoming the company’s defenses.

Meanwhile, the decoy infrastructure continued doing its job. Every attempt to extract data hit the fake C2 server. Every outbound transfer was silently absorbed.

The attackers believed they were successfully stealing information. In reality, they were going nowhere. And they quickly understood that.

Time passed. Their activity slowed. Queries became less frequent. Commands more hesitant.

Eventually, the probing stopped entirely. One connection dropped. Then another.

Finally, the last command session went silent.

The attackers had given up.

The room stayed quiet for a few seconds. Then someone leaned back in their chair.

“Well,” one analyst said, “that was fun.”

Ari didn’t smile. He stood up.

“Alright,” he said. “Now the real work begins.”

Several heads turned.

“Every entry point we saw tonight gets hardened.”

He pointed toward the screens.

“Authentication paths, network segmentation, monitoring rules. And anything else they even looked at.”

The team nodded.

This wasn’t just stopping an attack. It was making sure the same door could never be opened again.

Outside the SOC, the building had gone quiet for the night.

Inside, the team started rebuilding the defenses.

Stronger.

Smarter.

And far less forgiving.

← Back to all chapters

Ready to bring your program to the next level?

Get in touch