Got Hacked: Incident Response and Forensics

July 29 / 2016

You may think that to get hacked is like one in hundreds possibility. But actually you may underestimate it. All electronic devices are supposed to be able to be networked and of course each device has its own identification. Your mobile, for example, collects loads of your own private and confidential data. You use it connecting to internet and at the same time synchronize to your computer at work and email too. There are many gateways that your information flows may be hacked or breached to unintended hands. Information has its own value. That is why the statistics of hacking and data breaching are rapidly and you may be a target of attackers. According to M-Trends report 2016 from Mandiant, the median number to notice that your system has been compromised is 146 days. While 53% does not know that their system has been compromised and they need to wait for the third party to tell them. If such a problem happens, it will result into many consequences, to small or large scale of loss including loss of reputation, loss of your data and your business operation may be profoundly affected depending on how much and how long your data has been breached.

While you cannot prevent every cyber attack, you can detect and respond to it. But responding without comprehensive knowledge you might destroy evidence accidentally. That will make you never find the root cause and never be able to fix the issue.

Our team will help you to response promptly and minimize damage and system downtime to the least when you suspect that incident may occur and recovery plans may be needed additionally. We will collect all evidence and identify the root cause in secure and professional means. It means that your evidence can be presented with trustworthiness at the court when you eventually decide to file a lawsuit against someone.

Intrusion Discovery on Linux

SANS institute introduced intrusion discovery cheat sheet for system administrators. The cheat sheet suggests often used commands to find any…

CSRF Redirector

Yes, this is Cross-Site Request Forgery Redirector. If you are a fan of PHP, I am quite certain that you…

Smashing Flash Applications

Episode. 0X00 When we perform penetration testing against web applications, Flash embedded objects are in our scope. Even the stakeholder…

Intrusion Discovery on Linux

SANS institute introduced intrusion discovery cheat sheet for system administrators. The cheat sheet suggests often used commands to find any…

CSRF Redirector

Yes, this is Cross-Site Request Forgery Redirector. If you are a fan of PHP, I am quite certain that you…

Smashing Flash Applications

Episode. 0X00 When we perform penetration testing against web applications, Flash embedded objects are in our scope. Even the stakeholder…

Intrusion Discovery on Linux

SANS institute introduced intrusion discovery cheat sheet for system administrators. The cheat sheet suggests often used commands to find any…

CSRF Redirector

Yes, this is Cross-Site Request Forgery Redirector. If you are a fan of PHP, I am quite certain that you…

Smashing Flash Applications

Episode. 0X00 When we perform penetration testing against web applications, Flash embedded objects are in our scope. Even the stakeholder…