Digital Forensic Analysis
Advanced and detailed technological incident investigation security to identify causes, scope, origin and preserve digital evidence with complete legal validity.
Request ConsultingOur Analysis Process
We guarantee a rigorous methodology to preserve the integrity of the evidence and uncover the truth behind the incident.
1. Preservation and Collection
We secure the digital scene and extract copies bit by bit of the information to avoid any modification of the original data during the research.
2. Examination of Artifacts
We use top-level forensic tools to scan and filter recovered volumes, identifying hidden, deleted or fragmented.
3. Malware Analysis
We analyze the malicious code found (Reverse Engineering) to determine your capabilities, your communication method (C2) and the impact real in its environment.
4. Timeline
We reconstruct the exact sequence of chronological events of the attack to understand the intruder's behavior (TTPs) and how they gained initial access.
5. Chain of Custody
We guarantee the legal validity of all findings exhaustively documenting technical handling and storage of evidence.
6. Final and Executive Report
We deliver detailed technical results along with a executive summary on the impact of legal and business risk, and preventive actions key.
Vital Tips for Handling Evidence
If you are the victim of an incident that you expect to carry legal route or that requires in-depth investigation, protect the evidence by following these steps.
Isolate equipment immediately
Disconnect the network cable and turn off Wi-Fi on the suspicious machines. Do not restart or turn off the device, otherwise you will lose data relevantes en memoria RAM.
Restrict Physical Access
Limit other employees' access to the terminal or affected server. Minimize any keyboard or mouse interaction until the specialist arrives.
Document everything immediately
Record the time the anomaly was detected, who detected it, found, symptoms observed, and who had access to those files or computers by last time.
Do you need to conduct in-depth research?
Our team of forensic analysts has the ability and experience to reconstruct complex attacks, preserve evidence with validity evidence and offer compelling conclusions. Call us.
