Scenario
Vestige was contacted by the attorney for a material handling company after their e-mail system was broken into from the internet. While in the midst of defending a wrongful termination matter at the company, e-mail accounts for two current employees were commandeered by an Internet intruder and used to send false, but harmful, evidence to a third party recipient.
Vestige’s Intrusion Detection and Forensic Analysis team swung into action to trace the origin of the break-in and to help identify the sender of the harmful e-mails.
Working to swiftly identify all of the relevant log files and the various points for data collection, Vestige worked with the company, it’s Internet Service Provider, and a number of other ISPs to track and trace the origin. Vestige’s digital forensic investigators even helped in coordinating and sending subpoenas for the necessary information.
To help protect the culprit’s anonymity, the suspect rented computer time at a popular national computer retail establishment. In the end, this was not enough to protect his anonymity.
Vestige’s cyber security analysis team worked with the Information Security department of the retail establishment to obtain the surveillance video footage that showed indisputable evidence of who the culprit was. The rest, as they say, is history.
Success
Contact Us today to discuss how Vestige can assist with your CyberSecurity Matters.
- Client hired Vestige immediately, helping to ensure that volatile information used to track the culprit remained available
- Vestige proved the e-mails were the result of a break-in and not to be treated as evidence against the company
- Identity of culprit traced to the physical retail establishment used to “anonymously” send the e-mails
- Culprit admits break-in