Ransomware 3.0 Forensic Analysis
Executive Summary Ransomware 3.0 (sometimes referred to as Malware 3.0) is a new form of Artificial Intelligence (AI)-driven malware that uses cutting edge technology to enhance its adaptability, ...
Ransomware 3.0 Forensic Analysis
Executive Summary Ransomware 3.0 (sometimes referred to as Malware 3.0) is a new form of Artificial Intelligence (AI)-driven malware that uses cutting edge technology to enhance its adaptability, ...
IoT Exploitation Forensic Analysis
Executive Summary Internet of Things (IoT) devices are vulnerable to attacks due to weak authentication, outdated firmware, and unsecured network access. These devices can be hijacked to steal ...
Akira Ransomware Forensic Analysis
Executive Summary Akira is a ransomware-as-a-service (RaaS) operation that emerged in March 2023 which targeted various corporations and critical infrastructure entities. RaaS operations can lead to ...
Executive Summary On June 16th 2023, Microsoft disclosed that a Chinese cybercriminal group known as “Storm-0558” exploited a vulnerability in their cloud authentication system. The group was ...
SparkCat Malware Forensic Analysis
Executive Summary SparkCat malware is a form of malware which impacts iOS and Android devices. Discovered in late 2024, the malware uses Optical Character Recognition (OCR) technology to scan images ...
Trojan Horse Malware Forensic Analysis
Executive Summary Trojan horses, or “Trojans” colloquially, are commonly used to steal sensitive information, allow remote access to computers and even delete data on them. Using common sense ...
Worm Malware Forensic Analysis
Executive Summary Worms are a unique form of malware which spread across networks without an attacker needing to guide it. They can cause system slowdowns, data corruption, and unauthorized access ...
Stable Diffusion Forensic Analysis
Executive Summary Stable Diffusion is a program which can use artificial intelligence to generate images based on the prompts the user enters into it. Since its launch in August 2022, AI generated ...
Euler Hermes Group Deepfake Forensic Analysis
Executive Summary In March of 2019, an unnamed company involved with Euler Hermes had $243,000 stolen from them by scammers who used a deepfake of the CEO to convince the company’s leadership to ...
Ransomware and Blockchain Forensics
Introduction From individuals and small businesses to bigger organizations, one of the most prevalent threat types that society needs to be aware of is ransomware. It is a growing threat that ...