Outcome
We value knowledge sharing and prioritise skill upscaling. Your education is important to us. We encourage you to share and discuss the key concepts and tools featured. Please do reach out with any questions and suggestions for posts. If you are able to share your expertise, we would greatly appreciate your efforts. Stay in touch with your community, watch this space... We grow together.
In an evolving technological landscape, the curious mind prevails. But, not alone. We cannot track everything, contribute and learn with us.
Featured Posts
Cryptocurrency Investigation Case Study
2023
Blockchain Development and Analytics
Summary:
Upon purchasing an Evolved Ape NFT. The project quickly raised our suspicions. Due to a lack of due dilligence from the community, we dug deeper and found traces of metadata exposing malicious intent. We partnered with Solidity developers in house, and reverse engineered the smart contracts to identify key wallets of interest. Eventually Action Fraud and Binance were brought in. By working with Authorities, we were able to freeze over £3 million in funds and publicy exppose the identity of the fraudsters.
— Key Tools:
— Skills:
— Documentation:
— Appendix:
— Links:
— News Article: https://www.artnews.com/art-news/news/evolved-apes-nft-scheme-fraud-fbi-1234709334/
— Conclusion:
Corporate Investigation Case Study
2022
OSINT and Reconnaissance
Senior Executives tasked us with investigating a target. We were involved in investigating competitors and stakeholders using publicly available information. We found many interesting findings and mispractices. Linking personal endeavours to their businesses and building a topology of the inter-connected pieces. What started with initial reconnaissance and physical site visits, to using extensive toolkits to discover connections and mind-mapping findings for documentation report writing. It quickly become a large scale project that incorporated many different skillsets that we were able to showcase for our clients.
— Key Tools:
— Skills:
— Documentation:
— Appendix:
— Links:
— News Article:
— Conclusion:
Personal CyberSecurity (Anti-Dox Effort)
2021
Cybersecurity
When a good friend came to us in need of help to evade bad actors. We were able to provide protection and a strategy to avoid further exposure. Using our data hygiene plan we removed traces as well as secured their endpoints. Setting up remote networks and cloud services for their home lab and assisting with equipment set up, as well as inter-personal habits and cleansing historical activity.
— Key Tools:
— Skills:
— Documentation:
— Appendix:
— Links:
— News Article:
— Conclusion:
Education & Certificates
Coming Soon...
Links
