Cases

we have gathered several cyber events that have been handled by the firm's partners, which have been published in the media and pose a threat to many organizations and individuals.

Credit card company fraud and money laundering

In a leading credit card company in Israeli, was investigated for prohibited transactions, which constitute money-laundering offenses, by using a different code than required and the creation of transactions in the amount of billions of shekels. After a long and complex investigation, the cyber interrogators managed to produce evidence against

Read More »

Cyber extortion – Release of personal data

A hacker extorted a large company and threatened to distribute personal details of customers if no significant ransom money was paid. To do this he used an anonymous wireless Internet connection, each time from different cafes. Negotiations, forensics, and the integration of advanced technological capabilities led to the real-time detection

Read More »

Cyber extortion – Bank and credit card company

A man extorted a bank and a major credit card company in Israel and threatened to expose the details of their customers on the Internet. Thanks to intensive negotiations and the use of creative, technological and research tools, it was found that the surfer used the "deep web" and and

Read More »

Cyber extortion – under a disguise

In a leading credit card company in Israeli, was investigated for prohibited transactions, which constitute money-laundering offenses, by using a different code than required and the creation of transactions in the amount of billions of shekels. After a long and complex investigation, the cyber interrogators managed to produce evidence against

Read More »

Cyber Hack – bank

Israeli cybercriminals who broke into US banks and stole 80 million customers' information, were able to do so using a special and sophisticated method-the suspects had also encrypted their data while using a unique technology to disguise the incriminating information about them. The banks have had two major problems: the

Read More »

Forensic analysis

As part of the Prime Minister's investigations, in which he was tried and sent to prison, evidence was analyzed and identified from a government ministry for a long period of time, by restoring the Exchange software to relevant versions. This was done using backup tapes and the creation of diaries

Read More »

Internet gambling and money laundering

A sports betting internet site was discovered, which rolled approximately 340 million shekels," the headline screamed. What has not been published is the sophisticated way in which the criminals were caught. The use of virtual tools to investigate the extent of money laundering offenses enabled cyber investigators to locate and

Read More »

Murder by cyber lure

The murder of the boy Ofir Rahum shocked the whole country. "They succeeded in killing Ophir because of the Internet," the newspaper headlines shouted. The boy was kidnapped and murdered because of the use of cyber warfare. The decoding of the ICQ chat algorithm, using the victim's computer, led to

Read More »
גלילה לראש העמוד