Initial Access: Spear-phishing email clicked by user in Finance-EMEA.
Execution: Suspicious PowerShell spawned from Outlook with encoded command.
Lateral Movement: RDP connections from compromised host to 3 file servers.
Impact: 27k files encrypted across 2 shares · no production databases affected.
Recommended: Isolate impacted hosts, reset credentials, restore from last known-good backup, notify data owners.