From cybersecurity-skills
Investigates insider threats from employees or contractors via digital forensics, user behavior analytics, and HR/legal coordination for data theft or sabotage cases.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
- DLP (Data Loss Prevention) alerts on large data transfers to personal cloud storage or USB devices
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Do not use for external attacker investigations where compromised credentials are used without insider collusion; use standard incident response procedures instead.
Document the initial report and validate before proceeding:
Investigation Authorization:
━━━━━━━━━━━━━━━━━━━━━━━━━━━
Case ID: INV-2025-042
Subject: [Employee Name] - [Title] - [Department]
Allegation: Unauthorized transfer of proprietary data to personal cloud storage
Reported By: DLP system alert + manager concern
Legal Approval: [Counsel Name] - 2025-11-15
HR Liaison: [HR Name]
Scope: File access and transfer activity from 2025-10-01 to present
Systems in Scope: Workstation, email, cloud storage, VPN, DLP logs
Gather evidence without alerting the subject to the investigation:
Log-Based Evidence (non-intrusive):
User Activity Monitoring (requires legal approval):
Endpoint Forensics (if warranted by evidence):
Build a behavioral profile comparing normal vs. anomalous activity:
Behavioral Analysis:
━━━━━━━━━━━━━━━━━━
Normal Baseline (6-month average):
- Login time: 08:30-09:00 weekdays
- Files accessed: 15-25 per day (marketing department files)
- Email volume: 45 sent, 80 received per day
- Data transferred: 50MB per day average
- USB usage: None
Investigation Period (last 30 days):
- Login time: 22:00-02:00 (after hours, multiple occasions)
- Files accessed: 200+ per day (finance, engineering, executive files)
- Email volume: 120 sent per day (30% to personal gmail)
- Data transferred: 2.5GB per day average
- USB usage: 3 unique devices connected (Kingston DataTraveler)
- Print jobs: 847 pages (competitor analysis, customer lists, source code)
Anomaly Score: 94/100 (Critical)
Build a chronological timeline of the subject's actions:
Timeline of Activity:
2025-10-15 Subject submits resignation (2-week notice)
2025-10-16 First after-hours login at 23:15, accessed engineering Git repository
2025-10-17 USB device (Kingston DT 64GB) first connected at 23:30
2025-10-18 DLP alert: 450 files copied to USB, including CAD drawings
2025-10-19 200+ emails forwarded to personal Gmail account
2025-10-20 Google Drive desktop client installed, syncing corporate SharePoint
2025-10-22 Accessed executive SharePoint site (not normally accessed)
2025-10-25 Second USB device connected, 2.1GB transferred
2025-10-28 Print job: 847 pages including customer contact database
Evaluate the severity and coordinate the response with HR and legal:
Impact Assessment:
Response Options (determined by legal and HR):
Ensure all evidence meets legal admissibility standards:
| Term | Definition |
|---|---|
| Insider Threat | Risk posed by individuals with authorized access who intentionally or unintentionally cause harm to the organization |
| User Behavior Analytics (UBA) | Technology that analyzes user activity patterns to detect anomalies indicating potential insider threats |
| Data Loss Prevention (DLP) | Technology that monitors, detects, and blocks unauthorized transfer of sensitive data outside the organization |
| Legal Hold | Directive to preserve all relevant evidence and suspend normal document destruction policies during an investigation |
| Need to Know | Information access principle restricting insider threat investigation details to only authorized team members |
| Exfiltration Vector | Method used to move data outside the organization: USB, email, cloud storage, print, screen capture, photography |
Context: A senior software engineer with access to critical repositories submits a two-week resignation notice. The engineering manager reports that the engineer has been working unusual hours and downloading large amounts of code.
Approach:
Pitfalls:
INSIDER THREAT INVESTIGATION REPORT
=====================================
Case ID: INV-2025-042
Classification: CONFIDENTIAL - Need to Know Only
Subject: [Name Redacted] - Senior Engineer
Investigation Period: 2025-10-01 to 2025-10-28
Investigator: [Name]
Legal Counsel: [Name]
HR Liaison: [Name]
ALLEGATION
Unauthorized exfiltration of proprietary source code and customer
data following resignation submission.
EVIDENCE SUMMARY
1. Git logs: 47 repositories cloned (vs. baseline of 3)
2. USB transfers: 4.6 GB across 3 unique devices over 12 sessions
3. Email: 200+ emails with attachments forwarded to personal Gmail
4. Cloud: Google Drive sync client installed, syncing corporate files
5. Print: 847 pages including customer contact database
6. Physical access: After-hours badge access on 8 of 12 workdays
BEHAVIORAL ANALYSIS
[Baseline vs. anomalous activity comparison]
IMPACT ASSESSMENT
Data Classification: Confidential (source code, customer PII)
Estimated Volume: 7.2 GB exfiltrated
Regulatory Impact: Potential GDPR notification (customer PII)
Business Impact: Competitive advantage at risk
TIMELINE
[Chronological event listing]
RECOMMENDATIONS
1. [Legal/HR decision on employment action]
2. [Evidence preservation actions]
3. [Regulatory notification assessment]
4. [Access control improvements]