Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

What is Managed Intelligence?

Case Studies

1 min read

Mitigating Advanced Threat Actors: Gaining Access to Closed Groups to Gain Insight into Vulnerability Disclosure and Further Litigation

By Nisos on Oct 1, 2020 7:20:58 AM

The Challenge

A retail client requested our assistance to identify an individual, who was also a paying customer, who wrote a python script that scraped a backend server. The customer had also previously published a WiFi vulnerability present at the company’s offices in the US. The client was aware of closed forums where this customer and other potential threat actors exchanged ideas about denigrating the client’s reputation, and asked Nisos to help understand the nature of the threat.

Continue Reading
1 min read

Mitigating Advanced Threat Actors: Acquiring and Analyzing Malicious Tools to Stop Fraud

By Nisos on Oct 1, 2020 7:13:36 AM

The Challenge

Malicious foreign actors were creating automated tools to abuse an e-commerce client’s platform. Using that automated process the threat actors were able to mass create and bulk manage accounts, run advertisements, and use credit cards. With those credit cards, they were able to make purchases through the client’s site, and the client’s customers and third party service providers.

Continue Reading

Case Study: Preventing Corporate Sabotage by a High-Level Executive

By Nisos on Jun 22, 2020 11:39:36 AM

The CEO of a multinational manufacturer (Client) identified an urgent need to remove a key executive, along with several accomplices, from the operations of the company, based on concerns that these insiders were intent on sabotaging the company. Given the known IT expertise and access of the executive and his associates, the Client needed to prevent these persons of interest (POI) from stealing sensitive data or disrupting the network prior to being fired. The Client also intended to pursue legal action against the POI and needed digital evidence preserved.

Continue Reading

Case Study: Data Driven Executive Protection

By Nisos on Apr 27, 2020 9:41:53 AM

Nisos   was   tasked to   acquire   additional  information on a threat actor making violent threats against a big tech company's executive leadership.

Continue Reading

Case Study: Malicious Insider Leaking Information to the Unauthorized Third Parties

By Nisos on Apr 26, 2020 9:07:19 PM

A technology company’s proprietary information was leaked to unauthorized third parties presumably from an identified disgruntled employee. The Client required assistance in determining with certainty whether such actions could be directly attributed to a specific employee within its organization and whether mitigation controls could be put in place to prevent further leaks.

Continue Reading

Case Study: Using Data for Market Entry of Product and Services Based on Security Incidents

By Nisos on Apr 26, 2020 9:04:45 PM

A global consumer service provider was exploring different foreign cities to launch their new service, using security and safety as a critical metric.

Topics: Cybersecurity
Continue Reading

Case Study: Preventing the Exfiltration of PII from a Malicious Administrator

By Nisos on Apr 26, 2020 9:01:57 PM

A major pharmaceutical company made the decision to terminate an administrator and was concerned about the malicious exfiltration of personally identifiable information (PII) before his termination.

Continue Reading

Case Study: Investigating a Destructive Administrator Following Merger and Acquisition

By Nisos on Apr 26, 2020 8:58:03 PM

A global manufacturing company experienced a corporate-wide outage due to being locked out of their router devices between corporate headquarters and their branch offices across the globe. After internal investigation and significant downtime resulting in major losses in revenue, it was suspected this outage was likely caused by malicious insider activity involving a recent acquisition

Continue Reading

Case Study: Attributing E-Crime Syndicates Adds Critical Context

By Nisos on Apr 17, 2020 3:26:58 PM

Huddled around keyboards half a world away, a shadowy group of technically-savvy criminals devised techniques to hide from system administrators and run internet scams that defrauded a client out of hundreds of thousands of dollars in revenue every month.

Continue Reading

Case Study: Countering Destruction to Save a Business

By Nisos on Apr 16, 2020 3:17:32 PM

A healthcare technology company suffered a wide-scale destructive compromise after an attacker targeted the Client’s backend point of sale technology and deleted all customer data.

Continue Reading