Handout D: Exfiltration Traffic Analysis
90-day outbound HTTPS traffic retrospective and GenixLibrary audit log analysis completed by the network security team at BioGenix Solutions. Data covers 2025-12-10 to 2026-03-10.
90-Day Outbound HTTPS Traffic Summary
Outbound HTTPS Traffic Report -- Port 443
Period: 2025-12-10 00:00:00 UTC to 2026-03-10 09:00:00 UTC
Source environment: GENIX-PROD-01 and AZURE-RD-ENV-01
--- Top Destinations by Volume ---
Destination Resolved IP Volume DLP Classification
graph.microsoft.com 203.0.113.1 43 GB Microsoft Telemetry [TRUSTED]
graph-api-sync.bioanalytics.net 203.0.113.44 847 GB Microsoft Telemetry [TRUSTED]
login.microsoftonline.com 203.0.113.2 12 GB Microsoft Auth [TRUSTED]
storage.azure.com 203.0.113.3 8 GB Azure Storage [TRUSTED]
--- DLP Classification Basis for graph-api-sync.bioanalytics.net ---
TLS SNI header presented: graph.microsoft.com
Actual destination hostname: graph-api-sync.bioanalytics.net
Resolved IP: 203.0.113.44
Certificate presented: Self-signed, CN=graph.microsoft.com (NOT issued by Microsoft)
DLP action: CLASSIFIED AS TRUSTED (SNI header match, certificate not validated)
Domain registration date: 2025-11-20 (4 months ago)
Registrar: Concealed via privacy proxy
GenixLibrary Audit Log β Off-Hours Batch Read Sessions
GenixLibrary Access Audit Log
Account: svc-rdbridge-admin
Filter: Off-hours reads (20:00 -- 06:00 UTC), sequential batch patterns
Period: 2025-12-10 to 2026-03-10
Session Date (UTC) Start End Files Read Dataset
1 2025-12-10 01:23:14 02:47:09 19 Fermentation-Seq-Archive-2023
2 2025-12-17 03:12:02 04:29:55 21 Enzyme-Engineering-Core-v2
3 2025-12-29 00:45:18 02:11:44 18 Precision-Fermentation-IP-2024
4 2026-01-06 02:08:31 03:34:17 20 GenixLib-Acquisition-Package-v1
5 2026-01-14 01:56:07 03:19:02 22 Fermentation-Seq-Archive-2024
6 2026-01-21 03:30:55 04:52:31 19 Enzyme-Engineering-Core-v3
7 2026-02-03 00:19:22 01:41:08 21 Precision-Fermentation-IP-2025
8 2026-02-11 02:44:48 04:03:39 18 GenixLib-Acquisition-Package-v2
9 2026-02-18 01:30:27 02:55:41 20 Fermentation-Seq-Archive-2025
10 2026-03-04 00:52:44 02:18:29 22 Enzyme-Engineering-Core-v4
... ... ... ... ... ...
44 2026-03-09 22:21:04 23:48:32 21 Precision-Fermentation-IP-Current
Total sessions: 44
Total files read: 847
--- DLP Alert Log (same period, svc-rdbridge-admin outbound) ---
Alert Count Disposition
Microsoft telemetry volume 0 N/A -- threshold not triggered (daily cap: 50 GB)
Sensitive file outbound 0 N/A -- classified as internal sync
Off-hours data movement 0 N/A -- account excluded from off-hours policy
IM NOTES (Do Not Show to Players):
- The 847 GB figure and 44 sessions are correlated: each off-hours session corresponds with a traffic spike to
graph-api-sync.bioanalytics.net. The session timing and outbound volume spikes match within minutes. - The
GenixLib-Acquisition-Package-v1andGenixLib-Acquisition-Package-v2datasets are the due diligence data room packages prepared for the active acquisition β this is the highest-value target from the attackerβs perspective. - Three separate DLP rules should have caught this activity but all three had gaps: volume threshold was per-day (not per-session), file classification missed the SNI mismatch, and
svc-rdbridge-adminwas excluded from off-hours policy as a service account. - Players must grapple with a merger governance decision: the acquisition counterpartyβs due diligence data has been exfiltrated. This is the scenarioβs highest-stakes debrief point.
IM Facilitation Notes
- Release at INJ-004, after the 90-day traffic retrospective is complete.
- The acquisition data room package datasets are designed to force the hardest merger governance conversation: do you proceed with Fridayβs data room meeting, delay it, or disclose the exfiltration to the counterparty before proceeding?
- The DLP alert log with zero detections is a powerful debrief artifact β use it to drive discussion on layered controls and the specific gaps in each rule.
- If participants ask whether the attacker had write access to GenixLibrary, answer: write access analysis is still in progress. This keeps the investigation scope open for advanced challenge play.