If you suspect that your device (phone or computer), network, and/or communications security has been compromised by hacking, the use of spying applications, keylogging, or by other means, please contact Prudential Associates. We have a lot of experience on digital forensics.
Prudential Associates provides a wide variety of digital forensics services. We can examine a device or machine in an attempt to determine how compromised the device is, the method by which it was compromised, and to potentially gather information relating to the party responsible for the compromise.
Prudential Associates offers three levels of examination. Please contact us for details on services and costs.
Basic Examination
This level of examination provides a basic scan of the device using multiple digital forensics-grade tools and malware scanning programs.
What you can expect to receive under the Basic Level:
- Scan of the computer/cell phone using numerous digital forensics-grade malware detection programs
- Review of known system settings to determine if there is any apparent evidence of malware/surreptitious programs
- Basic “summary” digital forensics analysis report (1-2 pages)
The Basic Level is recommended for:
- Cases in which a subject has likely used basic/rudimentary methods (i.e. remote desktop, other basic attempts) to access the system.
- Cases in which the subject’s technical/computer abilities are equivalent to that of the average computer user.
- Cases in which the subject has not gone through great lengths to delete/hide evidence of the surreptitious access/malware.
- Clients who do not intend to use the results in court.
Standard Examination
In addition to those digital forensics services described in the Basic Level, Prudential Associates will conduct numerous hours of analysis to recover and identify data, which may require advanced processes; this includes identifying files specifically associated with malware/keyloggers/surreptitious access software, as well as identifying behavior that is indicative of these programs being currently or previously active on the examined device. This is considered the equivalent of a computer forensics exam that a police department or federal agency would undertake in a major criminal investigation.
The Basic Level is recommended for:
- Cases in which a subject has likely used basic/rudimentary methods (i.e. remote desktop, other basic attempts) to access the system.
- Cases in which the subject’s technical/computer abilities are equivalent to that of the average computer user.
- Cases in which the subject has not gone through great lengths to delete/hide evidence of the surreptitious access/malware.
- Clients who do not intend to use the results in court.
Standard Examination
In addition to those digital forensics services described in the Basic Level, Prudential Associates will conduct numerous hours of analysis to recover and identify data, which may require advanced processes; this includes identifying files specifically associated with malware/keyloggers/surreptitious access software, as well as identifying behavior that is indicative of these programs being currently or previously active on the examined device. This is considered the equivalent of a computer forensics exam that a police department or federal agency would undertake in a major criminal investigation.
What you can expect to receive under the Standard Level:
- All services from Basic Level, plus:
- Detailed analysis of the processes running on the system in order to differentiate between legitimate processes and suspicious/malicious processes.
- Detailed analysis of inbound/outbound network connections and ports, including investigation of any suspicious IP addresses.
- Detailed analysis of system logs (including deleted entries) to identify suspicious/malicious activity.
- Detailed/exhaustive search of the file system and unallocated space for evidence of malware files/data, as well as malware behavior.
- Response to specific suspicious issues/symptoms described by the client.
- Certification of results and later expert witness testimony.
- A detailed digital forensics analysis report.
- Recommendations to mitigate the risk of malware programs and improve your security.
- A turn-around time of approximately 21-30 days.
The Standard Level is recommended for:
- Cases in which the subject used an intermediate method to compromise the system (i.e. off-the-shelf keyloggers or other surreptitious access/remote access methods).
- Cases in which the subject’s technical/computer abilities are more advanced than that of the average user.
Advanced examination
A team of digital forensics examiners will conduct an exhaustive analyses of data, advanced recovery of deleted data, and utilization of advanced keylogger/surreptitious access methods beyond that of a “standard” forensic exam. Compared to the Standard Level, the Advanced Level provides ongoing computer and network monitoring . Prudential Associates will retain the digital evidence/results for 1 year after the forensic examination’s completion date. This level exceeds that of a computer forensic exam from most police departments or federal agencies.
What you can expect to receive under the Advanced Level:
- All services from Standard level, plus:
- Ongoing analysis of the computer/network over a certain period of time.
The Advanced Level is recommended for:
- Cases in which the subject used advanced methods to compromise a system (i.e. customized malware for a specific purpose, “zero-day” attacks, and techniques commonly associated with “hackers”).
- Cases in which the subject’s technical/computer abilities are considered advanced.
- Cases in which the subject has likely gone through great lengths to delete/conceal evidence of the surreptitious access.
- Cases in which the subject has taken advanced steps to delete files and hide data; this includes cases in which the subject has utilized specialized software to securely wipe/delete data from the computer, including reformatting.