Incident Response Service

The Incident Response Service, provided by SlowMist, is a specialized emergency response designed for Web3 projects. Its primary purpose is to assist project teams in rapidly and efficiently addressing black swan events, such as cyberattacks, by offering immediate support in mitigating security incidents and threats. The service includes a detailed analysis of the hacker's intrusion path, post-breach activities, and the creation of comprehensive on-chain and off-chain profiles. Additionally, trace and track stolen assets across blockchain networks. This service encompasses a full spectrum of incident response activities, ranging from in-depth on-chain and off-chain intrusion analysis to tracking stolen assets. Leveraging SlowMist's AML (Anti-Money Laundering) blockchain service and InMist threat intelligence network, we work to maximize the recovery of funds for project teams.

Contact Us

Processing Flow

Service Contents

Note: A successful incident response requires a high level of trust and collaboration between the project team and the SlowMist security team. Effective cooperation throughout the incident response process is essential for minimizing financial losses.

Service Deliverables

The following outlines the key deliverables and tasks included in the incident response service. For 'Scene Preservation,' our team will provide technical recommendations, which the project team is responsible for executing. This approach ensures a more streamlined and efficient response.

Service Content Class Subclass
Emergency Response Fund Loss Prevention Stolen Funds Statistics
Hacker Address Analysis
Risk Asset Recovery Plan Formulation
AML and InMist Integration
Scene Preservation Server Disk Snapshot (Image)
Log Collection and Management
Isolate PC from Network and Maintain Power
Digital Forensics On-chain Analysis Analysis and Monitoring of Stolen Fund Flows
On-Chain Fund Tracing and Source Analysis
Analysis of Hacker Behavior Patterns and Characteristics
Assisting Law Enforcement in Analyzing Evidence Materials (De-identified)
Off-chain Analysis Server Disk Snapshot (Image) Analysis
Anomalous Process Detection and Analysis
Suspicious Account and User Analysis
Operating System Log Analysis
Web Server Log Analysis
Data Storage Service Log Analysis
Network Communication Service Log Analysis
Malicious or Suspicious Program Detection
Malicious or Suspicious Program Analysis
Back To Top