Incident response
Incident response
Preparation
Compromise assessment
Attack verification
Preparation
Compromise assessment
Attack verification
Our incident response service helps you diagnose any malicious activity. Our team is composed of experts dedicated diagnosing suspicious behavior or real attackers : we help you to support your IT department for a better understanding of the attack. The goal of such offer is to understand in-depth how the attacker acts and measure the business impact of the cyber-attack for your service. A remediation plan is specially designed so that the same attack cannot be successful again and tackle the attacker.
Type of security incident:
- widespread attack with basic or advanced TTP (apt, ransomware, malicious internal activity, ...)
- unauthorized access to cloud service : Office 365, Google Workspace, ...
- compromise assessment of a suspicious workstation or a server (phishing, AD assessment, etc.)
- smartphone compromise assessment

Tools
OSS tools (for commercial purpose), home-made tools (leakozorus) and renowned commercial tools/hardware (ex: tableau, etc.)
Latest articles
Open-source toolset of an Ivanti CSA attacker
In recent incident responses where the root cause was an Ivanti CSA compromise, Synacktiv's CSIRT came across multiple open-source tools used by threat actors. This article dives into each of these to
...
Case Study: How Hunters International and friends target your hypervisors
Hunters International is a Ransomware-as-a-Service (RaaS) operation that surfaced in October 2023, after acquiring the source code and infrastructure of the late Hive ransomware group. Today, accordin
...
Forensic analysis of bitwarden self-hosted server
Bitwarden is a popular password managing software. Being open-source, it offers self-hosting capabilities with ease of use in a controlled office or home environment. Attackers might prioritize target
...