SentinelMesh

LiveDemo

Cyber-Physical Defense Copilot — Powered by ASI-1

Events Ingested

0
idle

Anomalies

0
monitoring

Threat Level

0%

Active Zones

0/10

Devices Online

0
all healthy

ASI Status

0complete

Event Stream

0

Assets

0

Facility Map

Normal Warning Alert
MAIN LOBBYOFFICE WINGCORRIDOR ASERVER ROOMRESEARCH LAB 1RESEARCH LAB 2CORRIDOR BCOLD STORAGEPARKING GARAGEROOFTOP
ATT&CK Kill Chain
4/5 Stages
🔍
ReconTA0043
🔓
Initial AccessTA0001
⚙️
ExecutionTA0002
🔧
PersistenceTA0003
📤
ExfiltrationTA0010
⚠ Advanced persistent threat — 4 stages confirmed

Threat timeline renders with event data

⚠ Active Incident — Immediate Action Required
criticalmulti vectorINC-2026-0323-001

Coordinated Physical-Cyber Breach: Rogue IoT Device with Active Data Exfiltration in Lab 1

96%
Confidence

An unauthorized IoT device (MAC: aa:bb:cc:dd:ee:01, vendor unknown/spoofed) was physically connected to the Research Lab 1 network rack, injected malware into camera cam-l1-01 exploiting CVE-2024-3721, disabled surveillance, and exfiltrated 2.4 GB of sensitive research data to external IP 203.0.113.77 via encrypted TLS. Simultaneous off-hours motion detection and failed credential attacks confirm a premeditated, multi-stage intrusion by a skilled threat actor.

Root Cause

Physical security bypass allowed an unauthorized individual to access the Research Lab 1 network rack and deploy a rogue IoT device with pre-loaded malware. The device exploited CVE-2024-3721 (CVSS 9.1) in camera firmware 1.2.3 to disable surveillance, establish a persistent foothold, and exfiltrate data via a TLS-encrypted covert channel to a known APT-linked IP range.

Business / Safety Impact

CRITICAL dual impact: (1) 2.4 GB of potentially sensitive research data exfiltrated to a suspicious external destination; (2) Complete surveillance loss in Research Lab 1 creates a physical safety blindspot for personnel, hazardous materials, and equipment; (3) Potential regulatory compliance violations (data breach notification laws, NFPA 101) due to impaired safety monitoring systems.

Escalation:
CISOFacility DirectorLegal CounselExecutive Leadership

What-If Simulator

Target: cam-l1-01

Report

Incident Report: Coordinated Physical-Cyber Breach: Badge Reconnaissance and Camera Admin Attack

Incident ID: INC-2026-0323-001

Timestamp: 23/3/2026, 9:15:00 am

Severity: 🔴 CRITICAL

Category: multi vector

Confidence: 96%


Executive Summary

An unauthorized IoT device (MAC: aa:bb:cc:dd:ee:01, vendor unknown/spoofed) was physically connected to the Research Lab 1 network rack, injected malware into camera cam-l1-01 exploiting CVE-2024-3721, disabled surveillance, and exfiltrated 2.4 GB of sensitive research data to external IP 203.0.113.77 via encrypted TLS.

Root Cause

Physical security bypass allowed an unauthorized individual to access the Research Lab 1 network rack and deploy a rogue IoT device with pre-loaded malware. The device exploited CVE-2024-3721 (CVSS 9.1) in camera firmware 1.2.3 to disable surveillance and exfiltrate data via a TLS-encrypted covert channel to a known APT-linked IP range.

Business / Safety Impact

2.4 GB of potentially sensitive research data exfiltrated to a suspicious external destination
Complete surveillance loss in Research Lab 1 — physical safety blindspot created
Potential regulatory compliance violations (NFPA 101, data breach notification laws)

Escalation Path

CISO → Facility Director → Legal Counsel → Executive Leadership

Immediate Actions Required

1.Isolate rogue device — network quarantine effective immediately
2.Block IP 203.0.113.77 and full /24 subnet at perimeter firewall
3.Initiate full packet capture for forensic analysis
4.Deploy threat hunting rules for CVE-2024-3721 across all camera assets
5.Brief CISO and executive team within 30 minutes

MITRE ATT&CK Kill Chain

Recon (TA0043) — Network reconnaissance detected
Initial Access (TA0001) — Rogue IoT device physically connected
Execution (TA0002) — CVE-2024-3721 exploited in camera firmware
Persistence (TA0003) — Surveillance disabled, foothold established
Exfiltration (TA0010) — 2.4 GB data sent via TLS to APT-linked IP