diff --git a/monkey/monkey_island/cc/services/telemetry/zero_trust_tests/machine_exploited.py b/monkey/monkey_island/cc/services/telemetry/zero_trust_tests/machine_exploited.py
index d4f8c53c1..7da763dd8 100644
--- a/monkey/monkey_island/cc/services/telemetry/zero_trust_tests/machine_exploited.py
+++ b/monkey/monkey_island/cc/services/telemetry/zero_trust_tests/machine_exploited.py
@@ -6,39 +6,44 @@ from monkey_island.cc.models.zero_trust.finding import Finding
 
 def test_machine_exploited(telemetry_json):
     current_monkey = Monkey.get_single_monkey_by_guid(telemetry_json['monkey_guid'])
+    target_ip = telemetry_json['data']['machine']['ip_addr']
+    exploiter = telemetry_json['data']['exploiter']
+    timestamp = telemetry_json['timestamp']
+    exploit_successful = telemetry_json['data']['result']
+
+    create_findings_from_exploit_data(current_monkey, exploit_successful, exploiter, target_ip, timestamp)
+
+
+def create_findings_from_exploit_data(current_monkey, exploit_successful, exploiter, target_ip, timestamp):
     events = [
         Event.create_event(
             title="Exploit attempt",
             message="Monkey on {} attempted to exploit {} using {}.".format(
                 current_monkey.hostname,
-                telemetry_json['data']['machine']['ip_addr'],
-                telemetry_json['data']['exploiter']),
+                target_ip,
+                exploiter),
             event_type=EVENT_TYPE_MONKEY_NETWORK,
-            timestamp=telemetry_json['timestamp']
+            timestamp=timestamp
         )
     ]
-
     status = STATUS_PASSED
-
-    if telemetry_json['data']['result']:
+    if exploit_successful:
         events.append(
             Event.create_event(
                 title="Exploit success!",
                 message="Monkey on {} successfully exploited {} using {}.".format(
                     current_monkey.hostname,
-                    telemetry_json['data']['machine']['ip_addr'],
-                    telemetry_json['data']['exploiter']),
+                    target_ip,
+                    exploiter),
                 event_type=EVENT_TYPE_MONKEY_NETWORK,
-                timestamp=telemetry_json['timestamp'])
+                timestamp=timestamp)
         )
         status = STATUS_FAILED
-
     Finding.save_finding(
         test=TEST_MACHINE_EXPLOITED,
         status=status,
         events=events
     )
-
     Finding.save_finding(
         test=TEST_MALICIOUS_ACTIVITY_TIMELINE,
         status=STATUS_INCONCLUSIVE,