We offer a wide range of cyber forensic services that can help your organisation investigate a cybercrime incident quickly and efficiently through a variety of forensic platforms, tools and techniques. The services our expert team can help with include:

Online investigations 

We conduct forensic investigations on the internet and the dark web, using a variety of tools including our threat intelligence and investigation platform; online investigation, cybersecurity and website acquisition tools; and custom-built threat hunting, open-source intelligence and reconnaissance workstations.

Such tools allow us to thoroughly investigate cybercrimes such as data hacks, defamation, bank account scams, domain name hijacking, identity theft, phishing and spear-phishing attacks, cyberstalking, cyberbullying, ransomware, cryptocurrency scams and illicit content.

Threat intelligence

Our threat intelligence investigations allow our clients to quickly determine the facts surrounding an ongoing attack and to take a proactive response in protecting their organisation against threats.

We use assessments and continual learning to determine if an attack is targeted or non-targeted, find patterns to better pinpoint possible adversaries and campaigns, and to locate and track additional indicators.

Threat hunting

Threat hunting is the detection of unusual or malicious activity on servers, networks and endpoints, which indicate signs of intrusion or compromise. We proactively hunt down and eliminate adversaries, actively searching for ways to intercept and minimise damage before it happens.

Offensive forensics

We use offensive forensics to tackle threats head on while also launching counteroffensive attacks that swamp hackers’ resources and distract their attention. We do this using a number of proactive forensics techniques including:

  • Dawn raids.
  • Domain takedowns.
  • Offensive frameworks, kits, payloads and tools.
  • Special denial of service attack tool which disrupts a targeted attack.
  • War driving to identify Wi-Fi networks and devices launching targeted attacks.
Incident response 
Our team of specialists is primed to use our forensic toolkit to trace the true identity of hackers swiftly, vital when subject to a cyber-attack. All digital evidence is then securely preserved for law enforcement authorities as well as to support the Computer Security Incident Response Plan in combatting cybercrime.

 

To discuss proactive, preventive strategies to ensure the resilience of your business or to discuss an immediate need, please contact Peter Allwright, Head of Suntera Forensics:

Peter Allwright

HEAD OF SUNTERA FORENSICS


To learn how we can enhance your business, contact Peter:

T: +44 1624 682205
M: +44 7624 322915
E: peter.allwright@suntera.com

See Peter’s profile