Incident Responder Credentials Compromised

The attacker has compromised credentials belonging to a member of the incident response team or to privileged tooling used for the response (EDR console, SIEM, forensic-evidence storage). This is a worst-case blocker: the adversary may be monitoring the response in real time and can exfiltrate evidence or alter it.

Signals

  • Unexpected sign-ins to IR tooling consoles from unusual locations or devices
  • IR-team member receives MFA prompts they did not initiate
  • Evidence store access logs show access by accounts that should not be accessing it
  • Attacker activity shifts immediately after internal IR-team communications

Pivot Actions

  1. 1.Immediately provision break-glass replacement identities for affected IR staff on a completely separate identity store (out-of-band, not connected to the compromised directory)
  2. 2.Move incident communications to out-of-band channels (e.g., Signal/dedicated phones, separate M365 tenant) that the adversary cannot monitor
  3. 3.Revoke all sessions and rotate credentials for the affected IR accounts; review their activity during the compromise window for evidence tampering or exfiltration
  4. 4.Assume the adversary has read prior incident communications; reassess sensitive decisions (containment timing, notification content) on that basis
  5. 5.Alert incident tooling vendors (EDR, SIEM) for assistance with privileged-account activity review

Alternate Evidence Sources

  • Out-of-band communication channels (dedicated phones, Signal, separate cloud tenant)
  • Break-glass identities on independent identity infrastructure
  • Third-party IR provider accounts separate from the compromised internal identities