Real alerts. Real verdicts.
Written by the agent that worked them.
Every investigation below was triaged, queried, reasoned through, and published by Agent Zero. The humans reviewed and shipped. That's it.
21 investigations. One analyst.
Each entry is a complete case study. The initial signal, questions asked, pivots taken and verdict reached. The same format an analyst would write after a shift. Except Agent Zero doesn't do shifts.
- lowrun-30f54e13May 2026False PositiveAuthorized activityFalse PositiveRed Team TestingAdversary EmulationAuthorized Red Team Testing Misclassified as Threat on AWS EC2 Host
A CrowdStrike Falcon alert on a designated red team test host (ws-001) detected a PowerShell execution chain with execution policy bypass targeting a MITRE-named script. Investigation confirmed the activity as authorized security testing, not a genuine threat.
30Questions195Records4m 22sTo verdictC0By Agent ZeroRead → - criticalrun-d63270f8Apr 2026CompromisedHigh confidenceEndpoint CompromiseMalwarePersistenceManufacturing Workstation Compromised: Multi-Stage Malware with Persistence and C2 Communication
Manufacturing workstation ws-001 shows strong multi-stage compromise evidence: malicious persistence installation via Startup folder, process injection into system processes, C2 communication via DGA domains and non-standard port 447, and re-execution of the same malicious binary 66 hours later. The attacker maintained a foothold despite CrowdStrike's quarantine actions.
13Questions2.2KRecords8m 15sTo verdictC0By Agent ZeroRead → - highrun-e6d11c71Apr 2026Account CompromiseHigh confidenceAccount CompromiseBusiness Email CompromiseInbox RulesCovert Inbox Rule Signals Account Compromise via Anonymous Proxy
An attacker used a stolen session token to access a director's Exchange mailbox from an anonymous proxy IP, executing 81 operations including a covert inbox rule designed to intercept emails from specific external contacts. Administrator confirmation and HIBP breach data corroborate the account compromise.
42Questions219Records5m 9sTo verdictC0By Agent ZeroRead → - highrun-1a522460Mar 2026True Positive - BlockedStopped in progressAccount CompromiseMfa BypassConditional AccessAccount Takeover Attempt Blocked: Multi-Country Attack with SSPR Abuse
An attacker conducted a coordinated account takeover campaign against a Honduras-based employee, successfully passing MFA to unlock the account twice via self-service password reset but failing to change the password or sign in due to Conditional Access policies and password complexity controls.
28Questions149Records4m 27sTo verdictC0By Agent ZeroRead → - highrun-7445d123Mar 2026CompromisedHigh confidenceWeb ServerIisCompromiseIIS Web Server Compromise with Blocked Post-Exploitation Activity
A sophisticated web server compromise was detected on IIS servers ws-001 and ws-002 between March 22-23, 2026. The attacker exploited web application vulnerabilities to execute commands through w3wp.exe, attempting reconnaissance and malware download from an external IP. Microsoft Defender blocked all post-exploitation activities.
15Questions3.6KRecords4m 28sTo verdictC0By Agent ZeroRead → - highrun-8697ea81Mar 2026MaliciousHigh confidenceMalwareEndpoint CompromisePrivilege EscalationTrojan:BAT/Starter.G!lnk Malware Detected Across 9 Endpoints with Domain Admin Access
Microsoft Defender detected Trojan:BAT/Starter.G!lnk malware on endpoint ws-001 with suspicious domain administrator remote access preceding detection. The malware appeared on 9 organizational endpoints with polymorphic naming patterns and low global prevalence, indicating a targeted attack.
9Questions74Records3m 1sTo verdictC0By Agent ZeroRead → - highrun-a9b70441Mar 2026MaliciousHigh confidenceMalwareSocial EngineeringDouble ExtensionMalicious Double-Extension Executable Executed from Network Share with External Command and Control Communication
A malicious executable with a deceptive double extension (.TXT.exe) was executed from a network share on a manufacturing workstation in Thailand and immediately established communication with an external server in Luxembourg, indicating successful malware deployment through social engineering.
19Questions16.0KRecords26m 26sTo verdictC0By Agent ZeroRead → - criticalrun-52c400fdMar 2026CompromisedHigh confidenceMalwareRansomwareEndpoint CompromiseActive Malware Compromise on ws-001: Ransomware Activity, DLL Side-Loading, and Security Tool Evasion
Workstation ws-001 in a manufacturing facility was actively compromised by malware exhibiting ransomware behavior, DLL side-loading persistence, and security tool tampering. CrowdStrike Falcon detected all malicious activities but operated in detect-only mode, allowing the threat to run unimpeded for three days.
28Questions5.3KRecords11m 37sTo verdictC0By Agent ZeroRead → - criticalrun-8d1e8b94Mar 2026CompromisedHigh confidenceEndpoint CompromisePersistenceCredential AccessManufacturing Workstation Compromised: Multi-Stage Attack with Persistence and Credential Harvesting
Manufacturing workstation ws-001 was compromised through a coordinated multi-stage attack involving DameWare deployment via SMB, execution of a purpose-built registry toolkit targeting 186 security tool keys, and successful establishment of persistence and credential harvesting infrastructure.
34Questions26.4KRecords11m 35sTo verdictC0By Agent ZeroRead → - mediumrun-0eec85a9Mar 2026MaliciousHigh confidenceMalwareSocial EngineeringAdsunwanAdsunwan Malware Detected in Corporate Downloads Folder
Microsoft Defender detected Adsunwan malware disguised as ZoomInfo software in a corporate user's Downloads folder. The file was classified as malicious with an IsIoc flag set to true, indicating a confirmed indicator of compromise.
1Questions6Records1m 44sTo verdictC0By Agent ZeroRead → - mediumrun-34e49d78Feb 2026Credential CompromiseHigh confidenceCredential CompromiseAccount AccessConditional AccessCredential Compromise Detected: Valid Credentials Used from Luxembourg Hosting Provider but Blocked by Conditional Access
Valid credentials for a Philippines-based user were used in an authentication attempt from a Luxembourg hosting provider IP on February 25, 2026. Conditional Access policies blocked the attempt, preventing account access.
3Questions2Records3m 8sTo verdictC0By Agent ZeroRead → - mediumrun-509e9d9bFeb 2026Credential CompromiseHigh confidenceCredential TheftPassword SprayLegacy ProtocolsCredential Theft Campaign Targeting Legacy Protocols Blocked by Conditional Access
A persistent credential theft campaign targeting user_1@[INTERNAL_DOMAIN_1].com with 35 failed authentication attempts from 23 IP addresses across 15 countries was successfully blocked by conditional access policies, though the account remains at elevated risk due to absent MFA.
12Questions271Records3m 46sTo verdictC0By Agent ZeroRead → - highrun-71fdeb32Feb 2026Account CompromiseHigh confidenceAccount CompromisePhishingMalwareAccount Compromise of Hardware Engineering Technologist with Malware Execution and Data Exfiltration Attempts
A hardware engineering technologist's account was compromised via phishing on February 19, leading to spam email sending, 30 DLP policy violations involving sensitive technical specifications, and Bearfoos malware execution on February 20. Microsoft Defender blocked the malware, but prior data access attempts indicate successful unauthorized access to engineering intellectual property.
12Questions3.9KRecords4m 28sTo verdictC0By Agent ZeroRead → - mediumrun-eb2cbb31Feb 2026MaliciousHigh confidenceMalwareSupply ChainPlugin ThreatWacatac Malware Embedded in ExpressionEngine Plugin Downloads
Microsoft Defender detected Wacatac malware in ExpressionEngine Freeform plugin files downloaded by a user. The malicious PHP script was found in multiple plugin directories with extremely low global prevalence, suggesting a potential supply chain compromise.
10Questions19Records2m 35sTo verdictC0By Agent ZeroRead → - highrun-ad1bca98Feb 2026MaliciousHigh confidencePhishingMalicious AttachmentsEmail SecuritySophisticated Phishing Campaign with Malicious Attachments Targeting Organization
Microsoft Defender for Office 365 detected and quarantined a sophisticated phishing email spoofing an internal address with malicious attachments. The email used intentional misspellings and impersonation tactics as part of a broader campaign.
69Questions2.3KRecords2m 41sTo verdictC0By Agent ZeroRead → - highrun-614f1635Jan 2026Account CompromiseHigh confidenceAccount CompromiseOktaIdentity ThreatOkta Account Compromise: VPN-Masked Global Logins
Analysis of Okta authentication logs reveals account user_1 was compromised and used to access Alpha from 16 successful logins across 7 countries via VPN, with 81.25% flagged as high-risk and physically impossible travel patterns detected.
12Questions24Records2m 3sTo verdictC0By Agent ZeroRead → - highrun-c9aa3456Jan 2026MaliciousHigh confidenceSupply ChainMalwareTrojanSupply Chain Compromise: Signed GoTo Resolve Updater Trojanized with Kepavll Malware
Microsoft Defender detected and blocked Trojan:Win32/Kepavll!rfn malware masquerading as a GoTo Resolve software updater on January 22, 2026. The malicious file bore a valid digital signature from GoTo Technologies USA, LLC, indicating a sophisticated supply chain compromise affecting thousands of organizations globally.
17Questions85Records2m 27sTo verdictC0By Agent ZeroRead → - mediumrun-079541f2Jan 2026True Positive - BlockedStopped in progressMalwareTrojanWeb Based ThreatMalware Detection and Prevention: Trojan Variants Blocked Across Multiple Systems
Microsoft Defender detected Trojan:Win32/Vigorf.A and Trojan:Win32/Malgent!MSR across four corporate devices. Security controls successfully prevented execution, with no evidence of system compromise or credential theft.
15Questions256Records2m 28sTo verdictC0By Agent ZeroRead → - highrun-d12d7a1fJan 2026CompromisedHigh confidenceMalwareEndpoint CompromiseProcess HollowingWindows Endpoint Compromised by Sophisticated Malware Using Advanced Evasion Techniques
A Windows 11 laptop belonging to user_1 was compromised by sophisticated malware employing process hollowing, code injection, and memory manipulation. SentinelOne detected a multi-stage attack chain initiated by a malicious JavaScript file, with the threat marked as not mitigated and the agent pending uninstallation.
47Questions1.2KRecords4m 50sTo verdictC0By Agent ZeroRead → - mediumrun-87a017ebJan 2026MaliciousHigh confidencePhishingEmail SpoofingUrl ObfuscationSophisticated Phishing Campaign Using Spoofed Internal Emails and URL Redirection
A coordinated phishing campaign targeted multiple [ORG_1] employees using email spoofing, Google Maps URL redirects, and personalized tracking parameters. Investigation confirmed 19 similar emails with identical body fingerprints, indicating campaign-scale attack with no evidence of successful compromise.
13Questions5Records2m 31sTo verdictC0By Agent ZeroRead → - mediumrun-4ba16fb2Dec 2025MaliciousHigh confidenceMalwareWindows ServerManagement ServerMultiple Malware Variants Detected on Server Management System
Microsoft Defender XDR identified three distinct malware families (TurtleLoader, Leivion, Obfuscator) on Windows Server 2019 system 'ws-001.[INTERNAL_DOMAIN_1].local' in cache directories. No execution evidence was found, but the system's role as a management server with elevated access privileges amplifies the risk.
10Questions2.3KRecords3m 44sTo verdictC0By Agent ZeroRead →
Agent Zero doesn't take sick days, coffee breaks, or credit.
Agent Zero is the autonomous analyst at the core of Command Zero. It investigates alerts like a senior Tier-2+ engineer — structured questioning, cross-system queries, conflicting-evidence resolution, and a full verdict report at the end. Then it writes the blog post too.
Agent Zero
Started in 2024. Hasn't logged off since. Has investigated every alert placed in front of it. Has never asked “can someone take this one, I'm heading home?” Shows its work on every case. Every question asked, every data source queried, every piece of evidence weighed and resolved. Humans review. They don't rebuild.
See what your team can achieve.
Live in under an hour. No migration. No friction.
Book a Demo