Operation SIMCARTEL Forensic Analysis
Executive Summary In a joint operation, Europol took down a large-scale SIM farm operation based in Latvia. Criminals were using this SIM farm to conduct fraud, scams, and phishing attacks, ...
Operation SIMCARTEL Forensic Analysis
Executive Summary In a joint operation, Europol took down a large-scale SIM farm operation based in Latvia. Criminals were using this SIM farm to conduct fraud, scams, and phishing attacks, ...
Tesla Cryptojacking Forensic Analysis
Executive Summary In January 2018, cybersecurity researchers discovered that Tesla’s cloud environment was being used unknowingly to mine cryptocurrency. There was also evidence that proprietary ...
Arup Deekfake Scam Forensic Analysis
Executive Summary In 2024, Arup, an engineering firm based in the United Kingdom, fell victim to a deepfake attack, which led to a loss of $25 million. An employee in one of their offices in Hong ...
Mirai Botnet Forensic Analysis
Executive Summary In 2016, the internet experienced some of the largest cyberattacks at the time. A botnet called Mirai infected hundreds of thousands of Internet of Things (IoT) devices, amassing a ...
Forensic Challenges in Detecting Sniffing Attacks
Executive Summary Two Dutch teens were arrested in the Netherlands on suspicion of spying after being recruited by pro-Russian hackers to capture wireless data near police and embassy buildings. ...
Velociraptor Ransomware Forensic Analysis
Executive Summary Attackers recently utilized Velociraptor to deliver ransomware to victim servers. This is the first documented case of this software being used as an attack vector but showcases an ...
Executive Summary In September of 2025, Microsoft’s Digital Crimes Unit, in collaboration with law enforcement and Cloudflare, seized 338 domains linked to RacoonO365. Raccoon0365 uses a ...
2023 Hawaii Community College Ransomware Attack Forensic Analysis
Executive Summary On June 19th 2023, Hawaii Community College suffered a ransomware attack carried out by a group known as “NoEscape.” Although data was stolen from 28,000 people, the college ...
Ransomware 3.0 Forensic Analysis
Executive Summary Ransomware 3.0 (sometimes referred to as Malware 3.0) is a new form of Artificial Intelligence (AI)-driven malware that uses cutting edge technology to enhance its adaptability, ...
IoT Exploitation Forensic Analysis
Executive Summary Internet of Things (IoT) devices are vulnerable to attacks due to weak authentication, outdated firmware, and unsecured network access. These devices can be hijacked to steal ...