VNCS owns a team of experts with many years of experience in the field of Information Security, well-trained in the field of information security, accompanied by security certificates from reputable organizations.
System Penetration Assessment Service – Compromise Assessment uses proprietary tools that automate investigation tasks and enable rapid assessment of network traffic and server-based artifacts — even on networks containing hundreds of thousands of systems.
Standardized process from identifying weaknesses or existing security holes on the infrastructure, from which to evaluate the level and priority of existing security holes based on the level of vulnerability. impact, the importance of resources/assets in order to put solutions to overcome and minimize risks
We work with Mandiant team, use experience gained over hundreds of investigations when assessing networks for the presence of various indicators of compromise including:
– Re-used custom malware: Custom malware is often developed at great expense to the attack group. Consequently, they prefer to reuse it — or variants that have similar characteristics. Attack groups can oftentimes be discovered by identifying malware analyzed during prior investigations
Several techniques can be used to establish and maintain an attacker’s existence in a system. Windows registry entries can store malicious code execution parameters, malicious code can be placed in the Startup folder, and legitimate system binaries can be trojanized. Recognizing what attack groups typically do allows us to look for signs of those mechanisms.
Most APT attack groups capture valid privileged credentials and use them to evaluate the environment. Knowing how they obtained those credentials and the tools they use to access other systems allows our experts to scour logs and forensic evidence of that attacker’s activity. .
Over the past few years, APT attack groups — often backed by criminal organizations or even countries — have targeted government agencies as well as private businesses and organizations. These attackers have managed to go undetected and can steal data for a long time. They develop custom malware themselves and use tactics that are difficult to detect with conventional methods.
Sign up to receive the latest information from VNCS
© 2022 Vietnam Cyberspace Security Technology. All Rights Reserved