24x7 Computer Security Incident Response Services

ESPC-CSIRT Incident Reporting System

Our secure Incident Reporting System provides a fast and confidential web-enabled method of reporting computer security incidents to ESPC-CSIRT. If you would like to report a computer security incident, please complete the following form to allow ESPC-CSIRT to understand your incident.

 

Our security experts will contact you within twenty-four hours. If necessary, they will ask for clarity or more detailed information to help you fix the problem together as quickly as possible.

 

We work with industry partners, Computer Emergency Response Teams (CERTs) and authorities around the world to assist you with your cyber incidents.

 

To subscribe to this service, please contact us at info [at] espc2go.com.

The above form collects your name and email address so that we can contact you in responding to your cyber incident(s). Check out our Privacy Policy for the full story on how we protect and manage the data that you have shared with us.

Backdoor Exploits

Backdoors are hidden application methods to bypass security access.

Backdoor Exploits

They are normally used for pushing updates, log files and remote support. Exploit occurs when people that know of these backdoors manipulate them to launch attacks.

Cyber Espionage

Cyber Espionage is the act or practice of obtaining an organisation's secrets without the permission of the owner.

Data Theft

Data theft is the act of stealing computer-based information from an unknowing victim with the intent to compromising privacy or obtaining confidential information.

Logic Bomb

A type of code that explodes or sets off certain malicious activities.

Logic Bomb

Payload is triggered when a certain condition (logic) is fulfilled. Most ransomware attacks has a built-in logic bomb.

Ransomware

A type of malware that uses public key encryption technology. It is propagated using infected email attachments and malicious websites (drive-by downloads).

Ransomware

When users are infected, ransomware locks certain files and folders. It then display messages and the original files names to request user payment in exchange for decryption of the infected files.

Rootkits

Tools that are installed after obtaining root or admin level access to a system. The admin or root access itself can be obtained by exploiting system privileges, vulnerabilities, etc.

Rootkits

Can be used for good purposes or for bad - you can have full control of a computer. When a rootkit is successfully installed, it becomes hard to be detected unless the antivirus or anti-rootkit software is up-to-date.

Social Engineering

In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

Social Engineering

It is easy and extremely effective to gain information as it exploits the human factor. Methods of Social Engineering: SMS, Phishing, Spear-Phishing, Shoulder Surfing, etc.

SQL Injection

Code injection technique use to exploit application database's data validation vulnerabilities.

SQL Injection

It allows attackers to spoof identity, tamper with existing data, voiding transactions or changing balances as well as destroy the data or make it otherwise unavailable.

Trojan Horse

A malicious software that appears to be legit but executes a hidden harmful malware without the user's awareness.

Rootkits

Normally, they are triggered by "exe" attachments from emails and drive-by downloads. A trojan horse can be used to carry a payload for other malwares such as ransomware, virus, worms, rootkits, backdoor exploits, etc.

Virus

Portray harmful behaviour in an infected computer environment. It can erase files, corrupt file names and types.

Virus

Encrypted Virus: Uses encryption and decryption modules to avoid detection. It renders computers inaccessible or useless.

Virus: Polymorphic Code

Virus code mutates itself to avoid detection, only mutates slightly.

Virus: Polymorphic Code

It uses built in encryption, decryption and polymorphic engines inside.

Virus: Metamorphic Code

A metamorphic virus is one that can transform based on the ability to translate, edit and rewrite its own code.

Virus: Metamorphic Code

It uses build metamorphic engine. Metamorphic viruses are considered to be more advanced threats than typical malware or even polymorphic viruses.

Worm

Replicates itself in order to spread to other computers. Often used to replicate malware and their payloads.

Worm

Common payload is to install backdoor for creation of zombie computers. It also exploits vulnerabilities in operating systems.

To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.

Robert E. Davis

We use cookies to improve user experience, and analyze website traffic. For these reasons, we may share your site usage data with our analytics partners. By clicking “Accept Cookies,” you consent to store on your device all the technologies described in our Cookie Policy. Accept Read More

ESPC on the go

FREE
VIEW