Business Communication
Project Evaluation
Pay for Expenses
Security Incident Response
Issue a Report
Through the use of SlowMist's AML system and InMist threat intelligence network, we support project teams in tracking hackers, freezing their funds, and recovering as much of the stolen assets as possible. A detailed incident response analysis report is provided as part of this process.
We provide technical guidance for securing compromised servers or PCs to ensure that forensic investigations can proceed smoothly by law enforcement authorities.
Our team conducts thorough on-chain analysis to identify the paths of intrusion, trace hacker funds, generate on-chain hacker profiles, and continuously track stolen funds on the blockchain.
Off-chain forensic analysis is performed on compromised systems, such as servers or PCs, to build hacker profiles and identify malicious activities.
Note: A successful incident response requires a high level of trust and collaboration between the project team and the SlowMist security team. Effective cooperation throughout the incident response process is essential for minimizing financial losses.
The following outlines the key deliverables and tasks included in the incident response service. For 'Scene Preservation,' our team will provide technical recommendations, which the project team is responsible for executing. This approach ensures a more streamlined and efficient response.
Service Content | Class | Subclass |
---|---|---|
Emergency Response | Fund Loss Prevention | Stolen Funds Statistics |
Hacker Address Analysis | ||
Risk Asset Recovery Plan Formulation | ||
AML and InMist Integration | ||
Scene Preservation | Server Disk Snapshot (Image) | |
Log Collection and Management | ||
Isolate PC from Network and Maintain Power | ||
Digital Forensics | On-chain Analysis | Analysis and Monitoring of Stolen Fund Flows |
On-Chain Fund Tracing and Source Analysis | ||
Analysis of Hacker Behavior Patterns and Characteristics | ||
Assisting Law Enforcement in Analyzing Evidence Materials (De-identified) | ||
Off-chain Analysis | Server Disk Snapshot (Image) Analysis | |
Anomalous Process Detection and Analysis | ||
Suspicious Account and User Analysis | ||
Operating System Log Analysis | ||
Web Server Log Analysis | ||
Data Storage Service Log Analysis | ||
Network Communication Service Log Analysis | ||
Malicious or Suspicious Program Detection | ||
Malicious or Suspicious Program Analysis |