BlogWhat Is Threat Intelligence? Threat Intelligence, or cyber threat intelligence, refers to knowledge and data about threats to company assets that can be used to inform and assist in prevention and response to that threat. This data is collected, correlated,...
Adversary Research
Russia Isn’t the Only Nation State Threat Actor: Keep an Eye on These Three Nation States
BlogRussia Isn't the Only Nation State Threat Actor: Keep an Eye on These Three Nation States The Russian aggression against Ukraine is no secret. It has certainly been getting a lot of airtime lately. Everybody seems to have written a blog or a white paper. Heck,...
Indonesian Disinformation Operators Stir China Tensions
BlogIndonesian Disinformation Operators Stir China Tensions Team Pandion™, the Nisos research team, recently discovered Indonesian disinformation actors pretending to be associated with U.S. military organizations. These actors were taking actions designed to increase...
Decrypting WeChat Messages Without Physical Possession of a Mobile Device
BlogDecrypting WeChat Messages Without Physical Possession of a Mobile Device A common problem in the world of digital forensics and insider threat investigations is that employees can use a third-party application, like WeChat, to exfiltrate data from a network, or...
Investigating Nation-State Espionage and Theft of Intellectual Property
The Challenge A technology company approached Nisos after it appeared some of their source code and intellectual property was leaked. The client discovered the issue after identifying a series of emails that had been sent to one of their engineers from a foreign...
Disrupting Nation-State Recruiting and Disinformation Efforts on Job Site Platform
The Challenge A job recruiting platform approached Nisos to determine the severity and authenticity of an affiliate recruiting company that appeared to be involved with disinformation and foreign nation state espionage efforts. The foreign nation state was suspected...
Mitigating Advanced Threat Actors: Acquiring and Analyzing Malicious Tools to Stop Fraud
The Challenge Malicious foreign actors were creating automated tools to abuse an e-commerce client’s platform. Using that automated process the threat actors were able to mass create and bulk manage accounts, run advertisements, and use credit cards. With those credit...
Malicious Insider Leaking Information to the Unauthorized Third Parties
The Challenge A technology company’s (the Client) proprietary information was leaked to unauthorized third parties presumably from an identified disgruntled employee. The Client required assistance in determining with certainty whether such actions could be directly...
Attributing E-Crime Syndicates Adds Critical Context
The Challenge Huddled around keyboards half a world away, a shadowy group of technically-savvy criminals devised techniques to hide from system administrators and run internet scams that defrauded a client out of hundreds of thousands of dollars in revenue every...
Countering Destruction to Save a Business
The Challenge A healthcare technology company (the Client) suffered a wide-scale destructive compromise after an attacker targeted the Client’s backend point of sale technology and deleted all customer data. Why Nisos In addition to the primary forensics firm that was...
Actively Countering Advanced Persistent Threats with External Telemetry
The Challenge A technology company (the Client) with thousands of employees across the globe was under attack by a nation-state level adversary. They requested Nisos’ assistance to provide critical intelligence to detect indicators and respond to the attack. Given the...
Eight Hours to Attribution
The Challenge A multinational manufacturer (The Client) came to Nisos for help responding to an unusual incident. An unauthorized user opened a trouble ticket in the Client’s internal IT ticketing system. In the ticket, the actor demonstrated access to sensitive...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.