Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCase Studies
Fusion Computing

Fusion Computing

The Caller Was Calm. The Malware Wasn’t. Inside Fusion Computing’s Response to a Silent Identity-Based Attack

Products Used

Managed ITDR

Managed EDR

It all started with a seemingly harmless call. A new employee picked up, unaware that a ransomware attack was quietly set into motion. What followed was a carefully orchestrated attack carried out with masterful precision. At the heart of this story lies a critical partnership that became the decisive barrier between restoring normal operations and total chaos.


Learn More About Fusion Computing

The setup | Never trust an unknown caller

Like any good horror story, this one starts with a phone call.

It was only day two on the job for a new hire at a fast-paced marketing agency. Amid the flurry of onboarding tasks, she figured there’d be plenty of unfamiliar faces and names reaching out. So, hoping to make a good first impression, she answered the phone.

The person on the other end sounded polite, professional, and reassuring. The caller explained the new employee would soon receive a Microsoft login prompt to set up her account in the company’s system.

Sure enough, the email popped up moments later. At first glance, everything seemed normal, like another mundane step in settling into a new role. She followed the instructions and entered her login details without a second thought.

Of course, as horror stories go, one small misstep can lead to things far more sinister.


The incident | Mere minutes until ransomware detonates

The employee had no idea that hitting "Sign in" wouldn’t just sign her into her account—it was signing the whole agency up for trouble. But who could blame her? She was only doing what anyone else would in her shoes.

The attacker took full advantage of her being new and eager to impress. It was social engineering at its finest. Without realizing it, she cracked open a virtual door just wide enough for chaos to sneak in.

“The attacker dropped code that copy-pasted some PowerShell into the Run dialog and eventually downloaded command-and-control software, which in turn downloaded a living-off-the-land (LOTL) program,” explains Mike Pearlstein, CEO of Fusion Computing. “And about 30 minutes later, it tried to download ransomware.”

The countdown to disaster had begun. 

But no one heard the clock ticking.



 “Huntress just works. How can you not have defense backed by an expert-led SOC and incident response 24/7 in your back pocket? Not having that for a dollar or two per agent leaves significant functionality on the table in a way that could save your bacon when you need it most.”

The secret weapon | Fusion, backed by Huntress

Unbeknownst to both the new employee and the attacker, the marketing agency had a powerful ally in Fusion Computing, a leading Toronto-based managed security services provider (MSSP). 

And better yet, Fusion was backed by Huntress.

“Microsoft Defender for Endpoint saw the attack, but it didn't throw an alert,” explains Pearlstein. “So, without Huntress in place, the agency probably would’ve had one or more machines taken offline, and they’d have incurred some serious losses.”

Before going deeper into how the breach was stopped, let’s rewind and see how Fusion came to rely on Huntress in the first place.



“For me, it’s really about the people behind Huntress. They're very knowledgeable and great to talk to. Whether it’s something basic or something intense, I've never had to wait long to chat with anyone. The experts have always been fantastic. They’re detailed, and I get exactly what I need to know, including next steps.”

Flashback | Why Fusion chose Huntress 

Starting in 2022, Fusion began searching for a partner that could meet their compliance goals and grow with them as their needs evolve. They were also on a mission to meet Center for Internet Security (CIS) Control Version 7 standards—a tall order that demanded full visibility, human-led support, and a readily accessible, 24/7 security operations center (SOC). 

After carefully evaluating solutions to complement Microsoft Defender, their decision came down to one well-known cybersecurity vendor…and Huntress.

The competing vendor, however, proved overly complicated and unfocused, trying to do too much without nailing the basics. Huntress soon emerged as the clear winner. 

Offering comparable functionality at a lower cost per agent, the Huntress platform provided seamless visibility across Fusion’s entire infrastructure. 

“Huntress plays an important role in our stack,” says Osama Munir, Fusion’s Cybersecurity Operations Lead. “We use it continuously to monitor endpoints for indicators of compromise. With most of our clients on Microsoft Business Premium licensing and utilizing Microsoft Defender for Endpoint, the Huntress platform integrates well with Defender and highlights detections with relevant information on an easily identifiable page.” 

The Huntress platform gave them clear visibility, intuitive remediation, and expert-backed threat response. Put simply, it gave Fusion the power to move fast when their clients needed it most.

Flashback | The power of community

For Fusion, Huntress’ “human element” helped seal the deal. Fusion was impressed by Huntress’ strong presence in the cybersecurity community. From the CEO’s unfiltered insights to the in-depth analysis provided by their threat analysts, Huntress gave Fusion something they’ve rarely seen from a partner—transparency and authenticity. 

“Thought leadership is key,” says Pearlstein. “When I can see more of who people are, I feel better about the engagement, which is why we're with Huntress. I've got a real relationship with a partner, and I know it’s for the long term.”

“How Huntress engages with the community is extremely important to us, and no other organization does it better,” adds Munir.  


Proof from the past | What legacy tools missed, Huntress found

Fusion once had a client reluctantly holding onto Bitdefender’s antivirus (AV) and endpoint detection and response (EDR) tools. The client was dealing with sluggish system performance, and despite clean scan results, something was off.

Given their trust and confidence in Huntress, Fusion recommended the client trial Huntress Managed EDR and Managed Identity Threat Detection and Response (ITDR) on a handful of their devices. Almost instantly, Huntress began uncovering incidents, artifacts, and remnants from past malware infections that Bitdefender had completely overlooked.

“What Huntress found when it was installed was artifacts of a BlackCat infection,” says Pearlstein. “There were significant artifacts and even executables of living-off-the-land tools associated with that threat group.”

The evidence was irrefutable. And the client quickly rolled out Huntress across their entire organization.


Back to the breach | The identity attack that went nowhere

Let’s go back to that marketing agency. Everyone went about their day with no idea there was a silent, ticking time bomb. Ransomware was set to detonate, growing more dangerous with each passing second.

Then, the clock just stopped. 

Huntress’ Managed ITDR detected the hacker’s activity within minutes. Before ransomware could shut down operations, the Huntress SOC acted decisively, isolating the compromised device and stopping the attack in its tracks.

“They got lucky,” admits Pearlstein. “Without Huntress in place, we’d probably be on the phone with their cyber insurance provider right now, and we’d definitely be dealing with significant downtime and financial losses.”

But Huntress didn’t just identify the threat—the SOC delivered a comprehensive debrief outlining exactly what had happened. They also provided clear, actionable steps for remediation.

“It was clear from the notifications exactly what had happened and what needed to be done,” says Munir. “Because some of our clients aren’t the most technical, they just care about being operational right away, and the simplicity of Huntress helps us achieve that.”

Munir explains that he and Pearlstein had both attended a conference when they got the alert for this incident. But they weren’t concerned. He adds, “The fact that we had those assisted remediation steps meant our internal team could easily go in and conduct those fixes and investigations without us having to be present.” 

Munir emphasizes that deploying and monitoring ransomware canaries and external recon of ports adds powerful insight into his clients’ organizations. “With ITDR now, this has become an essential part in reviewing and remediating risky sign-ins for our clients,” he says.



“It was clear from the notifications exactly what had happened and what needed to be done. Because some of our clients aren’t the most technical, they just care about being operational right away, and the simplicity of Huntress helps us achieve that.”


After the incident | A grateful CEO sighs in relief 

Pearlstein recalls telling the agency’s CEO, “I can't believe how lucky you are today. If Huntress hadn't been there, you probably wouldn't be operating now. And you’d be on the phone with your clients trying to salvage things.”

The CEO was at a loss for words, simply responding, “Oh my God! Thank you so much!”

Always empathetic, Pearlstein asks, “It was only that poor employee’s second day of work; what were they supposed to do?” He adds that he deployed security training for the new employee to help enhance their security posture moving forward. 

“We tell our clients that Huntress is the reason that threat actors aren’t connected to your computers,” says Munir. “With Huntress in place, we’ve been able to mitigate threats quickly and ensure our clients don’t experience much downtime and can go forward with their jobs.”


How Fusion benefits from Huntress | A partnership built to scale

Fusion partnered with Huntress for its ability to scale with compliance needs while driving thought leadership and innovation. For Fusion, Huntress isn’t just a tool. They’re a trusted partner who provides:

  • Ease of use: The Huntress dashboard delivers clarity, providing agent health and detailed incident reviews all in one place.

  • Cost efficiency: Because Huntress is fully managed by an expert SOC and gives them easy-to-follow remediations, anyone at Fusion can take action. It doesn’t tie up in-house specialists' time, making it cost-effective for operations.

  • 24/7 expertise: With the Huntress SOC’s follow-the-sun coverage, Fusion has unmatched visibility and real-time support at any time of day. 

  • Fast mean-time-to-resolution (MTTR): From receiving an alert to sending an incident report, Huntress has an eight-minute MTTR.   

  • Community engagement: Fusion is a proud part of the Huntress community. Pearlstein highlights, “Getting someone like John Hammond on the phone to talk things through has been very powerful not just for me but for business leaders who might not understand cybersecurity that well.”


Fusion x Huntress | People-powered protection meets purpose-built tech

Huntress technology is purpose-built to work hand-in-hand with their human-led SOC, making detection and response fast and agile. That means no delays in waiting for third-party vendors to respond. This setup lets Fusion succeed without needing to shake up their operations or hire more staff. Plus, with straightforward remediation, the platform gives everyone—from help desk newbies to seasoned tech pros—everything they need to act with confidence.

“For me, it’s really about the people behind Huntress,” adds Munir. “They're very knowledgeable and great to talk to. Whether it’s something basic or something intense, I've never had to wait long to chat with anyone. The experts have always been fantastic. They’re detailed, and I get exactly what I need to know, including next steps.”

“Huntress just works,” Pearlstein concludes. “How can you not have defense backed by an expert-led SOC and incident response 24/7 in your back pocket? Not having that for a dollar or two per agent leaves significant functionality on the table in a way that could save your bacon when you need it most.”




We tell our clients that Huntress is the reason that threat actors aren’t connected to your computers. With Huntress in place, we’ve been able to mitigate threats quickly and ensure our clients don’t experience much downtime and can go forward with their jobs.


Fusion Computing
Contact
Osama Munir, Cybersecurity Operations Lead
Location
Toronto, Canada
About

This solid, professional, and forward-thinking managed services firm has been offering managed IT services and support to the greater Toronto and Hamilton areas since 2008. A full-service IT provider, Fusion Computing specializes in virtual CIO and fully managed IT, 24/7 support, and cloud services, as well as hosted email and cybersecurity management. 
Learn more at fusioncomputing.ca.

Other Case Studies

  • Securing Smiles
    Securing Smiles
    How Cytek saved a dental surgery practice threatened by data extraction, thanks to the 24/7 vigilance of Huntress.
  • Securing Customers
    Securing Customers
    In the wake of supply chain attacks targeting SMBs, F1 Solutions went all in on Huntress to secure customers.
  • Fit Secure
    Fit Secure
    Fit Secure partners with Huntress for advanced security solutions, delivering enterprise-grade protection, faster threat detection, 24/7 SOC support, and scalable security for their clients.
  • Prelude to Ransomware
    Prelude to Ransomware
    Huntress’ Managed EDR capabilities provided an added layer of security to help catch an active ransomware incident in its tracks—and restore business operations within 30 hours of the attack.
  • Homer Community Consolidated School District 33C
    Homer Community Consolidated School District 33C
    When a public school district needed to meet new cyber insurance requirements, they had to find a solution that wouldn't take time or budget away from students. See how their small IT team used Huntress to get 24/7 coverage across endpoints, speed up remediation, and build a stronger security culture.
  • Real-Time Defense for Healthcare Clients
    Real-Time Defense for Healthcare Clients
    Nelson Gomes explains how Huntress helps PriorityOne Group protect and support their highly regulated healthcare clients.
  • GCIT
    GCIT
    GCIT enhanced security with Huntress, gaining 24/7 monitoring, a dedicated SOC, and actionable insights to swiftly detect and mitigate an Evilginx attack while reducing alert fatigue.
  • Progressive Computing Inc
    Progressive Computing Inc
    Building Partnership and Confidence: Progressive Computing Finds a True Partner in Huntress
  • NetStandard
    NetStandard
    Hear how NetStandard cut false positives by 98%, stopped an active attack, and scaled securely, all with Huntress as a trusted MSP partner.

Add Cyber Experts to Your Arsenal

See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.

Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy