Mobile forensics

Secure evidence and identify the cause,
the scope and the perpetrator of the attack.

Fast and effective reconnaissance with mobile forensics

What is mobile forensics?

Digital forensics plays a central role in the investigation and preservation of evidence in the area of cybercrime.

Digital forensics experts secure and analyze digital traces.

Why is digital forensics important for your company?

Digital forensics enables companies to respond quickly and effectively to cyber attacks. Evidence of a cyber attack can be secured, which can be used for prosecution and compensation claims. In addition to identifying the perpetrators, by analyzing the evidence, the cause of a cyber attack can be understood and measures can be taken to prevent further attacks. In this way, the impact of an attack can be minimized and the damage limited, and the findings can be used to prevent future attacks.

Our approach to digital forensics

Our digital forensics experts secure all relevant data, including logs, files and system images. We analyze the collected data to determine the type of attack and the extent of the damage. We then create detailed reports that can be used in court and identify the attackers.

Digital forensics - procedure

Our experienced security experts carry out forensic investigations according to a procedure model based on international standards and best practices:
Preparation, data collection, investigation, data analysis, documentation and optional follow-up.

In addition, our experts can support you in incident response and crisis management to deal with the consequences of a cyber attack.

Digital forensics secures traces of attacks for use in court

The digital forensics process in six phases

Strategic and operational preparation
We will discuss the initial situation with you and explain our approach. Depending on the incident, the appropriate forensic tools will be selected.

Data collection

We collect important data from potentially affected components during this phase. This includes, for example, system time and system date, active processes (system status), open network connections (sockets) and logged-in users.

Investigation

The collected data is now analyzed and the data relevant to the incident is filtered out. Some data can be excluded from further analysis (e.g. by using unchanged checksums). However, it may also be necessary to extend the analysis to additional parts of the IT system.

Data analysis

The findings from the partial investigations of the various components concerned are integrated into a coherent timeline and logically linked together.

Documentation

Our IT forensic experts summarize the recorded processes of the investigation in reports. These are adapted to the respective target group; the management report contains different technical details than a report for administrators. If it is necessary to inform the authorities, we will support you in drafting the relevant reports.

Follow-up (optional)

Optionally, we identify potential vulnerabilities after incident handling. We provide recommendations for measures to prevent future attacks and support you in improving your company's response strategy (incident response process).

Important security-related topics

Hackers falsify your e-mail address

Hackers falsify your e-mail address

Hackers often use fake CEO emails to infiltrate corporate networks. If they have access to such emails, they can commit CEO fraud and infiltrate the network more easily. If a hacker tries to infiltrate a company's network...

Anti-phishing email policies in Microsoft Office 365

Anti-phishing email policies in Microsoft Office 365

Admins can use Microsoft 365 Defender for Microsoft 365 to create policies to protect against phishing attacks. Special policies are used for this purpose, which can be created directly in the Microsoft 365 Admin Center. To create email policies in Microsoft 365...

Four times more ransomware cases due to attack on ERP

Four times more ransomware cases due to attack on ERP

A new ERP Threat Report from Onapsis and Flashpoint highlights the evolution of the SAP threat landscape over the last four years. It shows the growing maturity of this cybercriminal market and the challenges faced by the defense side. Established,...

Please feel free to contact us

Do you need support in the area of digital forensics or incident response? Then contact us today. We would be happy to help you deal with a cyber attack.