← Back Client: Australia's leading online floral retailer Date: 17/9/2007
Forensically collected and analysed data and logs from relevant network devices, servers and firewalls. Interviewed the client’s IT administrators and staff.
The fact of intrusion had been confirmed. It was determined that an application vulnerability had been used to compromise systems and gain full access. A piece of malicious software responsible for maintaining remote control capabilities to an attacker was located. The attacker and his location have been identified, and the matter had been referred to the relevant authorities.