arrow&v

Washington DC

1300 I Street NW

Suite 400E, Washington

District of Columbia, 20005

+1 202 749 8432

Kyiv

 

10/14 Radyscheva St., Kyiv

Ukraine, 03124

+380 44 594 8018

Tbilisi

 

33b Ilia Chavchavadze ave, 0179, Tbilisi, 

Georgia
+995 32 224 0366

Wrocław

 

1 Grabarska st., 50-079  Wrocław,

Poland

+48 71 747 8705

Almaty

808V, 165B Shevchenko St, 050009, Almaty,

Kazakhstan

+7 727 341 0024

i n f o @ i s s p . c o m

© 2018 by ISSP - Information Systems Security Partners

ISSP Labs & Research Center was established in 2015 with the aim of providing digital forensic investigation services, including collection, preservation, analysis, and presentation of computer-related evidence. 

It specializes in the analysis of computer networks security elements and systems, including penetration testing, investigation of cyber-attacks through collecting and analyzing evidence, analyzing malware samples and finding indicators of compromise.

NotPetya Reverse
Engineering

We simulate an attack on your IT systems and networks to identify vulnerabilities that may pose risks for your organization and compromise mission and business critical assets. Penetration testing allows revealing vulnerabilities an attacker could exploit to gain access to your environment and systems. The penetration testing results will provide a picture of vulnerabilities which your organization is exposed to. Pentesting will also help evaluate the staff’s reaction to different situations and decide if employees need additional training. 

We identify evidence of ongoing or past intrusions in your environment, assess weaknesses and vulnerabilities in your security architecture, and define missing and bad IT and cybersecurity practices. Utilizing the actual database of indicators of compromise, patterns of malicious behavior, and memory forensic tools our experts evaluate network traffic, servers, endpoints, and logs to answer the question of whether your organization has been breached. 

Identification of compromised systems and bad practices will help you see your organization’s systemic risks and exposures as well as increase your ability to respond effectively to future incidents.

04/23

Reverse Engineering with Ghidra

Ghidra enables flexible configuration and is designed to facilitate multi-user work on the same reverse project. 

03/20

Operation ShadowHammer

Last year, a group of state-sponsored hackers cracked the ASUS Live software update server and implanted malicious updates installing backdoors on more than one million Windows computers worldwide.

02/09

Phishing of DHL accounts

Today we are going to discuss a case study of elementary phishing and, as usual, it’s a real-life example.

We analyze malware samples to understand the anatomy of an attack, extract indicators of compromise and examine whether the computer infrastructure has been breached. Utilizing the most advanced technologies and expertise ISSP Labs & Research Center offers solutions that make a difference.

ISSP Labs conducts digital investigations, collects and analyzes evidence of cyber attacks. The forensic work is performed following the latest international standards and procedures. Our experts keep track of the latest cyber threats and TTPs used by threat agents and, from that perspective, identify even the most difficult to find evidence of cyber attacks.