Countering a sustained cyber attack with an inventive cyber investigation
Our client—a publicly-traded insurance company with operations in Canada, the US, and Central America—faced an unrelenting online trolling campaign. The attack was orchestrated by an individual who created close to 30 social media accounts to elude identification. The company’s counsel had engaged several experts and tried various approaches but couldn’t identify the individual.
Reviewed troll’s activities, geographic and background to reveal probable name
Identified where and when the troll was active and developed sophisticated internet-based undercover approach
Used public records to identify 15 possible subjects with the same name and location
Used in-house developed forensic and technological methods to isolate the troll from the 15 possible subjects
The attack’s unrelenting, strategic nature required an equally sustained and multifaceted approach. We began with a comprehensive review of information about the troll and his activities. Our review generated geographic and background details that revealed his probable name.
We then identified where and when the troll was active and developed a sophisticated internet-based undercover approach to make contact and identify his various IP addresses.
We then used public record and open-source information to identify 15 possible subjects with the same name and location that was discovered during our undercover operation.
Finally, we used in-house developed forensic and technological methods to isolate the troll from the 15 possible subjects. This strategy also tied him to the IP addresses and equipment he was using to access the internet.
Every business has a unique story. We can help define yours with meaningful advice to help you find the way forward. Find out how.