Copyright Phishing Lures Leading to Rhadamanthys Stealer Now Targeting Europe
Analysis of new Rhadamanthys infostealer campaign in Europe and malware breakdown
Read MoreLeverage seasoned digital forensics and incident response experts with decades of court room experience as your expert witnesses.
Talk to an Expert
Cyber incidents are increasingly leading to litigation, including class action lawsuits and regulatory enforcement actions, as organizations face legal scrutiny over data exposure and compliance failures. During litigation preparation, you rely on the technical expertise of cyber crime investigators and computer forensics experts to interpret complex technical concepts and strengthen your case strategy. When the case gets to trial, they competently validate the chain of custody of crucial evidence, dive into technical evidence analysis, and confirm the reasonableness and standard of care of the organization’s security posture. You have Cybereason professionals as your expert witnesses.
An expert witness must have breadth and depth of knowledge, experience, and proficiency in order to provide counsel with outstanding support from early case assessment all the way through trial. Cybereason experts leverage decades of experience as former CISOs, digital forensics and incident response leaders, law enforcement, and FBI, establishing us as dependable experts. We have translated and explained technical concepts both during trial preparation to help counsel understand forensic evidence, as well as in depositions and trial testimony in ways both judges and juries will understand.
With hundreds of engagements under our belts, we have seen countless incidents and organizations be legally challenged. Our experts have provided support for legal proceedings including arbitrations and mediations for the U.S. Federal and State courts, and have assisted law firms in determining compliance with standard of care issues, as well as the evaluation of claims related to compliance with industry and privacy frameworks.
From providing support during an incident, through remediation, business recovery, and hardening your systems against future threats, our team understands what constitutes reasonable cybersecurity posture. We have deep experience across many security frameworks, including FedRAMP, PCI, NIST, HITRUST, among others, and are well versed in industry accepted standards. We can establish the standard of care and reasonableness of an organization’s security posture at the time of an incident.
Leveraging experience from working hundreds of business email compromise and insider threat investigations, our team can provide expert testimony as it relates to trade secret and IP theft litigation for these types of incidents. We can:
Determining the scope of a breach and the extent of the impact is important to understanding material risk. Our team is able to assist in assessing potential harm to individuals, evaluating the breadth of data exfiltration or unauthorized disclosure, and providing supporting arguments for or against class certification.
Looking at deep and dark web postings as well as threat actor intelligence can provide a holistic understanding of the extent of a data breach and exposed data. Our team can help:
A team of medical researchers misused proprietary research to launch a competing medical practice.
Our experts were brought in to recover and analyze the stolen data from multiple computer systems. Using advanced anti-forensics techniques, we traced the origin of the data and pinpointed the exact timeline of its extraction. This reconstruction of events was critical in supporting the prosecuting attorney’s case and ultimately facilitated a successful settlement negotiation.
An organization experienced a third-party data breach that resulted in the exfiltration and ransom of sensitive information belonging to tens of thousands of clients. In response, a class action lawsuit was filed, with plaintiffs alleging irreparable harm due to the exposure of personally identifiable information (PII).
Our forensic experts were engaged to assess the validity of these claims and conduct a comprehensive dark web investigation. Through our analysis, we discovered that the affected individuals had already been exposed in unrelated data breaches prior to this incident. This finding played a critical role in challenging the assertion that the current breach was the sole cause of harm.
Following a cybersecurity incident, an organization faced a class action lawsuit from a partner company alleging that insufficient security controls constituted a breach of contract and were grounds for early termination.
Our experts were engaged to evaluate whether the organization’s cybersecurity measures met contractual obligations. We conducted a thorough assessment of the client’s security posture, benchmarking it against NIST standards as well as practices from peer organizations within the same industry and of similar size.
Our analysis revealed that the client’s security policies, incident response plans, and execution not only met expectations, but exceeded industry averages in both adoption and response time. As a result, our experts were able to conclude that the organization had maintained a reasonable and robust security posture and were not in breach of contract.
Cybereason’s computer forensics experts provide support from trial preparation to litigation and trial, through depositions, sworn testimony, cross examination and expert witness reports including affidavits and declarations. Leverage decades of cybersecurity expertise to support your case strategy pre, during, and post trial by using Cybereason experts.
0 +
0 +
0 +
0 +
Analysis of new Rhadamanthys infostealer campaign in Europe and malware breakdown
Read MoreIn this Threat Alert, Cybereason identifies a malware infection exhibiting similarities to a previous Genesis Market campaign.
Read More