A video hosting service was made aware of potential security breaches to their platform. They suspected that a hacker was behind the attacks and set out to identify the perpetrator.

The company used Navigator’s People Search tool to uncover the hacker’s Instagram handle as well as their school email address. This information helped them to identify where the hacker was located and their true name. 

However, the hacker tried to report the hack to the company using their true name so that they would be financially rewarded for the lead. The company was able to link the report back to the hacker using the information they had obtained from the People Search tool.

case-study_search-v02

The Instagram profile of the hacker was originally private, but the company set up a following on the handle. When the handle became public, they were able to pull data, which was a significant breakthrough in the case.

The People Search tool proved to be a valuable asset in the company’s investigation of the security breaches. It helped to identify the hacker, uncover their true identity, and prevent further attacks. 

Using Navigator, the company was able to quickly identify the digital footprint of the hacker, and automatically monitor for social exposure.

This ultimately saved hundreds of person-hours in manual searching.

What Our Customers Are Saying

Navigator is my “one-stop shop” to monitor and identify open source threats while keeping a pulse on the global geopolitical landscape, persons of interest, and the deep and dark web.”

— Navigator Customer in the Tech Industry (Size: 3-5k)

How Navigator can help with Threat Actor Investigations

Checkmark icon
  • Uncover the online footprint of a threat actor 
  • Associate an online persona with a real-world individual
  • Assess the digital history of a threat actor across multiple online sources from surface web to dark web
  • Provide automated alerting to understand changes in threat posture

Using Open Source Intelligence For Cyber Threats & Threat Actor Investigations

icon-identify


People Search

Use People Search to learn more about the individual and validate the threat

Location icon


Follow Accounts of Interest

For ongoing monitoring


Deep & Dark Web icon


Deep & Dark Web Monitoring

Threats can emerge from a growing list of alt-tech social networks and the Deep and Dark Web.

Related Posts

Ready to get started?

Our team of experts are here to set you up with your customized security solution.

Book a Discovery Call