Lethal News

CYBER INVESTIGATIONS, FORENSICS & RESPONSE

At Lethal Forensics, we specialise exclusively in cybersecurity and digital investigations. We combine digital investigative services with incident response expertise that empower organisations to respond effectively to the growing complexity of modern cybersecurity incidents.

LethalForensicsYour Weapon Of Choice

"

CYBER INVESTIGATIONS, FORENSICS & RESPONSE

No sales pitch, just unmatched results.

At Lethal Forensics, we specialise exclusively in cybersecurity and digital investigations. We combine digital investigative services with incident response expertise that empower organisations to respond effectively to the growing complexity of modern cybersecurity incidents.

LethalForensicsYour Weapon Of Choice

About Lethal Forensics

   

Lethal Forensics

Your Weapon Of Choice

Lethal Forensics is a highly specialized forensic company, which united the passion for conducting the most advanced independent investigation and response services with enhanced customer satisfaction.

In addition, Lethal Forensics has a strong focus on automation and on building their own tools to level up traditional DFIR with faster cyber investigations (e.g. Remote Evidence Collection, Memory Analysis, Cloud Incident Response, Business Email Compromise).

“After serving more than ten years as a Law Enforcement Officer (including combatting cybercrime), and covering digital forensic investigations, threat hunting and cyber breach response in the private sector for more than ten years, I wanted to be my own entrepreneurial spirit and founded Lethal Forensics.”

Martin Willing (Founder & Owner)

We are ready to provide high-end digital forensics and incident reponse services in your matter!

Our Services

Mac Forensics

The increasing popularity of Apple devices can be seen everywhere, from coffee shops to corporate boardrooms. As the Mac footprint grows across organizations of all sizes, macOS has become a prime target for cybercriminals.

More Information

Mac Forensics

The increasing popularity of Apple devices can be seen everywhere, from coffee shops to corporate boardrooms. As the Mac footprint grows across organizations of all sizes, macOS has become a prime target for cybercriminals.

More Information

M365 Investigations

We specialize in conducting forensic and compliance investigations in Microsoft 365 (M365) cloud environments with a big focus on investigating and responding to phishing attacks and Business Email Compromise (BEC), one of the most common and costly threat to organizations of all sizes.

More Information

M365 Investigations

We specialize in conducting forensic and compliance investigations in Microsoft 365 (M365) cloud environments with a big focus on investigating and responding to phishing attacks and Business Email Compromise (BEC), one of the most common and costly threat to organizations of all sizes.

More Information

M365 Compromise Assessments

Nearly 99% of cloud breaches result from misconfigurations or human error (excluding insider threats), leaving organizations exposed to ransomware, phishing attacks, and data breaches. With our exclusive package of a combined security assessment with an advanced Threat Hunting – we call it M365 Compromise Assessment – we’ll identify misconfigurations, vulnerabilities, enhance resilience, and provide actionable insights to your organization.

More Information

M365 Compromise Assessments

Nearly 99% of cloud breaches result from misconfigurations or human error (excluding insider threats), leaving organizations exposed to ransomware, phishing attacks, and data breaches. With our exclusive package of a combined security assessment with an advanced Threat Hunting – we call it M365 Compromise Assessment – we’ll identify misconfigurations, vulnerabilities, enhance resilience, and provide actionable insights to your organization.

More Information

Mobile Forensics

Mobile devices such as smartphones, tablets and wearables are becoming increasingly important and are playing an ever-greater role in our private and professional lives. As a result, the forensic examination and analysis of mobile devices is also becoming more and more relevant, especially in the context of breach investigations and corporate investigations.

More Information

Mobile Forensics

Mobile devices such as smartphones, tablets and wearables are becoming increasingly important and are playing an ever-greater role in our private and professional lives. As a result, the forensic examination and analysis of mobile devices is also becoming more and more relevant, especially in the context of breach investigations and corporate investigations.

More Information

Corporate Investigations

We provide forensic investigative services for all types of organizations with alleged or suspected fraud, misconduct, or other improprieties. Whether you need support for litigation in progress or need to avoid costly lawsuits altogether, having all the facts will only strengthen your position.

More Information

Corporate Investigations

We provide forensic investigative services for all types of organizations with alleged or suspected fraud, misconduct, or other improprieties. Whether you need support for litigation in progress or need to avoid costly lawsuits altogether, having all the facts will only strengthen your position.

More Information

Digital Forensics and Incident Response (DFIR)

Digital Forensics and Incident Response (DFIR) is an emerging cybersecurity discipline that focuses on identifying, remediating, and investigating cyber security incidents. When a cyber-attack occurs, the first priority is recovering from the incident – stop bleeding, and business continuity.

More Information

Digital Forensics and Incident Response (DFIR)

Digital Forensics and Incident Response (DFIR) is an emerging cybersecurity discipline that focuses on identifying, remediating, and investigating cyber security incidents. When a cyber-attack occurs, the first priority is recovering from the incident – stop bleeding, and business continuity.

More Information

Training

We provide customizable training courses and consulting that adapts to your needs and experience level (Remote or onsite).

To meet your individualized needs, we offer a wide range of custom-tailored Cybersecurity and DFIR training to equip you with the necessary skills, knowledge and especially tools to respond to real-world scenarios.

More Information

Training

We provide customizable training courses and consulting that adapts to your needs and experience level (Remote or onsite).

To meet your individualized needs, we offer a wide range of custom-tailored Cybersecurity and DFIR training to equip you with the necessary skills, knowledge and especially tools to respond to real-world scenarios.

More Information

Our Products

Microsoft-Analyzer-Suite

Community Edition – Free Tool

View on Github

MemProcFS-Analyzer

Community Edition – Free Tool

View on Github

Collect-MemoryDump

Community Edition – Free Tool

View on Github

Microsoft-Analyzer-Suite

Professional Edition – Premium Tool

Coming soon

Recent Articles

Lethal Forensics

Lethal Archive

Explore our blog for latest news, research, and other cyber topics from out team of experts.

Corporate InvestigationDFIRM365 InvestigationMac ForensicsMobile ForensicsTools

Your Weapon Of Choice

Lethal Forensics

Frequently asked questions

Below you’ll find answers to common questions about our digital investigative services. If you have additional questions not addressed throughout our site, please contact us, and we will be happy to provide the answers you need.

LethalForensicsYour Weapon Of Choice

What Services Does Your Company Offer?

Lethal Forensics delivers proven expertise in digital forensics and cyber investigations to lawyers, law firms and organizations of all sizes. Our services include Digital Forensics, Incident Response, Threat Hunting, Cyber Security, Business Email Compromise (BEC) Response and Investigation, Microsoft 365 Incident Response, Microsoft 365 Compromise Assessments, Cloud Security Assessments, Corporate Investigations, Mobile Forensics, Mac Forensics, Training, and much more.

We support your individual case with forensic consulting, innovative technical solutions, and efficient investigation methods. Learn how your organization can benefit from our digital forensics services.

Contact us

 

What is Digital Forensics?

Digital Forensics is the process through which forensic investigators identify, preserve, analyze, document, and present electronic evidence gathered from a variety of sources, including computers, mobile devices, remote storage devices, internet of things (IoT) devices, and virtually any other computerized system.

Originally, the term was used as a synonym for computer forensics and primarily applied to criminal investigations, focusing on the identification and use of electronic evidence in the prosecution of crimes. However, in recent years, the term has been expanded to include many other types of investigations and now encompasses the examination of any system on which digital data is stored.

The goal of digital forensics is to preserve the existing evidence as it is (or to minimize any alterations during the preservation process) while identifying useful information that helps the forensic investigator reconstruct past events. This includes, in particular, the ability to derive valuable, coherent information from data and understand how and why certain traces were created in a particular way.

What is DFIR?

Digital Forensics and Incident Response (DFIR) is an emerging cybersecurity discipline that focuses on identifying, remediating, and investigating cyber security incidents. When a cyber-attack occurs, the first priority is recovering from the incident – stop bleeding, and business continuity. But recovery is not enough, because in order to fully eradicate the threat, and prevent it from recurring, organizations need to understand the who, what, when, where, and how of a cyber security incident (Root Cause Analysis).

DFIR is the perfect combination of two highly specialized sub-fields of cybersecurity:

Digital Forensics: This investigative branch of forensic science collects, analyzes and presents digital evidence such as user activity and system data. Digital Forensics is used to uncover the facts about what happened on a computer system, network devices, smartphones or tablets and is often employed in litigations, regulatory investigations, internal company investigations, criminal activity and other types of digital investigations.

Incident Response: It is the structured approach to handling and managing the aftermath of a security breach or cyberattack. The goal of incident response is to minimize the impact of the incident, recover from it, and prevent future occurrences. It involves detecting incidents, containing the threat, eradicating the root cause, and recovering affected systems.

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is the unauthorized access to one or more mailboxes by a threat actor. Threat actors usually perform BEC attacks against organizations via spear-phishing attacks targeting relevant executives (mostly CEOs and CFOs) or their sales staff in order to commit financial fraud, such as misdirecting payments or wire transfers to an actor-controlled bank account («Payment Diversion Fraud», also known as «Payment Redirection Fraud»).

In modern cloud environments, like Microsoft 365 (M365), financial fraud is still a primary goal, but actors are increasingly evolving BEC attacks (including outbound spam to business partners) to gain greater access. Threat actors explore connected services like SharePoint, OneDrive and Teams to pivot to network environments where they can exfiltrate and sometimes encrypt (ransom) sensitive data.

In addition, the attackers combine spear-phishing with a so-called adversary-in-the-middle (AiTM) attack to circumvent multi-factor authentication (MFA) and a Microsoft 365 design flaw that allows them to create access persistency with MFA.

BEC attacks can cause significant financial losses and undermine trust in business relationships, so it is crucial to be aware of this risk and take appropriate protective measures. Account Takeovers (ATO) can go undetected for weeks or months, especially if the threat actors simply monitor payment flows and validations to help craft a successful attack.

What is an M365 Compromise Assessment?

Nearly 99% of Microsoft 365 cloud breaches result from misconfigurations or human error (excluding insider threats), leaving organizations exposed to ransomware, phishing attacks, and data breaches. The technology’s novelty and complexity mean that best practices are still forming, leading to a higher chance of misconfigurations.

We offer a combined security assessment of your Microsoft 365 environment (Microsoft Cloud Security Review) with an advanced Threat Hunting – we call it M365 Compromise Assessment – we’ll identify misconfigurations and weaknesses, enhance resilience, and provide actionable insights to your organization. Where other teams stop, we dig deeper to identify ongoing and past attacker activity to help you to spot also undetected security breaches.

What is (Forensic) Triage?

The term “Triage” is derived from the French word “trier” (separate out) and originally comes from military medicine and describes a situation in which, due to limited resources, a classification of patients is performed. The purpose of classification is to ensure that given limited resources, care can be provided with minimal harm to each individual patient (e.g. sorting casualties to rationally allocate limited resources on the battlefield).

Forensic Triage is the initial phase of a digital investigation, providing rapid assessment and prioritization of digital evidence. It is the process by which forensic investigators and/or incident responders will quickly identify and categorize potential evidence and relevant artifacts in order to determine the scope and direction of a forensic investigation. Filtering what is critical to the case and what isn’t is the difference between the success and failure of an investigation. This process involves a combination of automated tools and human expertise (Efficiency, Accuracy, Resource Management, and Rapid Response).

In short, it is the action of sorting items according to quality (combined with investigative knowledge and skills).

error: