8 -1920 x 1080 pixels

vProfiler™

vProfiler™

Modus Cyberandi’s virtual Profiler (vProfiler) retained service provides your organization with a uniquely trained and experienced Behavior Profiling expert available on an as-needed basis. As a specialized, trusted advisor to organizations of all sizes, a vProfiler helps organizations enhance existing cyber security, forensic analysis, incident response and threat intelligence capabilities or fill the void where organizations have no in-house expertise.

Learn how vProfiler service fits into your organization

Behavioral Threat Intelligence (BTI)™

Behavioral Threat Intelligence (BTI)™

Amplify your Cyber Threat Intelligence (CTI),  End-point Detection and Response (EDR), Extended Detection and Response (XDR), Management Detection and Response (MDR) and Threat Hunt programs with Behavioral Threat Intelligence (BTI) developed from FBI Behavioral Profiling principles.

4- Behavioral Threat Intelligence
3

Ransomware Engagement, Analysis and Profiling (REAP)™

Ransomware Engagement, Analysis and Profiling (REAP)™

Ransomware attacks are a complex constellation of factors and interactivity between victim(s), offender(s) and technical infrastructure.  Unlike many types of cyberattacks, ransomware creates a context that necessitates victim engagement with the offenders to remediate the attack and regain access to data that the offenders have nefariously encrypted.  Further, in cases of “double and triple extortion,” victims must engage with the offenders to prevent their “hostage data” from being leaked (or otherwise exposed) on the Internet—and/or seek cessation the offender’s use of denial-of-service attacks that serve as additional pressure and leverage, preventing the victim’s online resource from being accessible on the Internet. 

Cyber Victimology™ Assessment

Cyber Victimology™ Assessment

Cyberattacks and cyber information operations can target broad, narrow or specific victims.  In traditional criminology context, victimology is the study of the etiology (causation) victim selection and the relationship between the victim and offender(s).  With the advent of the numerous online platforms and environments which have become part of social and business norms, offender and victim dynamics are further complicated, making it more challenging to understand why your organization has been (or will be) targeted by cyber attackers.

2- Cyber Victimology
4

Cyber Group Dynamics™ Assessment

Cyber Group Dynamics™ Assessment

Modern cyberattacks are frequently conducted by a group of cyber offenders.  Whether criminally motivated organized cyber crime syndicates (such as ransomware and BEC groups) or nation-state attackers working for foreign hostile intelligence services, understanding the behaviors, influential actions, structures, processes and changes that occur within these cyber groups is paramount to understanding and defending against their attacks. Understanding a cyber group allows for a comprehensive picture of specific members of a group who may be more focal targets for analysis.

Cyber Deception Analysis

Cyber Deception Analysis

As Behavioral Profilers that created the FBI’s Deception & Influence Group, our experience and expertise in cyber deception and adversarial information operations is unparalleled.  Let Modus Cyberandi decode these aspects of attacks  for you and provide countermeasure consultation to keep your valuable data, resources and company reputation safe.

Want to learn more about Cyber Deception?

9- Cyber Deception Analysis and Consultation
7- Digital Behavioral Criminalistics

Digital Behavioral Criminalistics™

Digital Behavioral Criminalistics™

Digital Behavioral Criminalistics™ (DBC) is a method and process of assessing offender behavioral and digital artifacts in evidence sources. Unlike traditional digital forensics, DBC is a cross-disciplinary approach (behavioral sciences, digital forensics and criminalistics) to meaningfully uncover, reconstruct and understand offender thought processes, behaviors, emotions and actions captured in digital artifacts and media.

Cyber Influence and Information Operation Analysis

Cyber Influence and Information Operation Analysis

With the evolution of social media, user-generated content platforms, and other technologies, information channels are more vast and less verifiable.  Adversaries now regularly leverage this technology, making cyberattacks increasingly more sophisticated. As a result, traditional cyberattacks, such as computer intrusion, ransomware and other malware campaigns, now frequently have an influence or information operation component to impact the target victim(s), amplifying the attacks.  Recent investigations and prosecutions reveal that the line between nation-states and criminal groups is frequently blurred and  how hacking groups use the information acquired from computer intrusions as the information used to craft propaganda and influence campaigns.

Case Linkage Analysis

Case Linkage Analysis

Similar to the traditional analysis of violent serial crimes, Cyberattacks can be linked together if in the commission of the crimes the offender(s) behaved in a very similar way.

8
Picture2

Cyber Persona Assessment™ & Cyber Credibility Assessment™

Cyber Persona Assessment™ & Cyber Credibility Assessment™

Unmask the adversary and know their motivations and intentions.  Modus Cyberandi’s Cyber Persona Assessment™  & Cyber Credibility Assessment™ service is the deepest analysis and evaluation of the veracity, authenticity, believability and/or trustworthiness of a persona or other online entity in online, digital or virtual environments/contexts.

ADVANCED CYBER ADVERSARY ANALYSIS

1

ADVANCED CYBER ADVERSARY ANALYSIS

ADVANCED CYBER ADVERSARY ANALYSIS

Cyberattacks are not a malware or technical problem—they are a human problem.  Go beyond technical data analysis and indicators—understand the adversary.

2

BEHAVIORAL ATTRIBUTION

BEHAVIORAL ATTRIBUTION

Attribution is more than identification—it’s knowing why your adversary is targeting you, how they are trying to do it, and their willingness and ability to attack.  Illuminate adversary behaviors and attribute them from pre-offense actions,  previous attack campaigns, open-source intelligence and other data sources.

3

ASSESS ADVERSARIES’ MOTIVATIONS, THINKING PROCESS, AND INTENTIONS

ASSESS ADVERSARIES’ MOTIVATIONS, THINKING PROCESS, AND INTENTIONS

Cyberattacks always begin with a motivation.  Understanding adversaries’ motivations inform the behaviors and  steps that occur toward targeting your organization.

4

EXPLOIT ADVERSARY VULNERABILITIES

EXPLOIT ADVERSARY VULNERABILITIES

Cyberattacks are a human problem, not a malware or technical problem.  Every person has emotions, thoughts, perceptions, expectations and neurobiological responses that shape his or her decision making—cyber adversaries are no different. Modus Cyberandi’s behavioral profiling services provide the deepest assessment of adversary vulnerabilities.

5

KNOW YOUR ADVERSARIES’ PERCEPTIONS, EMOTIONAL STATES, INFLUENCES AND TRIGGERS

KNOW YOUR ADVERSARIES’ PERCEPTIONS, EMOTIONAL STATES, INFLUENCES AND TRIGGERS

Scientific research reveals that as humans, our emotions impact how we perceive things and how we make decisions.  Understanding attacker emotional states, influences and triggers provides a valuable sight picture into how they may perceive and think…before they act.

6

GUIDE YOUR ADVERSARIES’ DECISIONS

GUIDE YOUR ADVERSARIES’ DECISIONS

People make choices based upon a constellation of factors. Sometimes choices are made quickly through heuristics (rules of thumb, or “cognitive shortcuts”) and other times they are made slowly through careful deliberation. A number of other psychological, sociological, neurobiological and cultural factors impact decision making. Modus Cyberandi are trained, experienced experts in understanding how people make decisions and how to shape choices. 

7

ASSESSMENT AND PROFILING

ASSESSMENT AND PROFILING

Unlike traditional criminal profiling and threat assessment, cyber behavioral profiling requires deep knowledge of technical artifacts and datasets to properly assess the “digital weapon selection/usage” and “digital crime scenes” that cyber attackers engage in and leave behind.  Modus Cyberandi lead Profiler, Cameron Malin, not only served as a 21-year FBI Cyber Agent (11 years of which as a Cyber Behavioral Profiler in the BAU)  but as the co-author of four industry recognized books on Malware Forensics and adversary Digital Deception, giving your organization access to the deepest expertise and experience in this space.

8

Reconstruct, interpret and understand adversaries’ “digital crime scenes”

Reconstruct, interpret and understand adversaries’ “digital crime scenes”

Amplify technical data with human data. Traditional criminalistics (crime scene forensics) relates to collecting evidence from physical crime scenes where an offender has engaged in criminal activity, and in turn, analyzing this evidence scientifically in a laboratory. Modus Operandi has unprecedented experience and expertise in digital behavioral criminalistics, a unique assessment service to distill attackers’ thoughts, actions, and behaviors from digital artifacts. Let your DFIR and Threat Hunt teams benefit from the human data about the adversary to get a complete, holistic threat picture.

9

Gain insight into the dynamics of cyber threat groups to defend your organization

Gain insight into the dynamics of cyber threat groups to defend your organization

Modern cyberattackers are often carried out by criminal groups and/or nation state threat adversaries. Truly defending against these threats and defending your organization requires knowing why these groups are targeting specific victims, how the groups operate…and their vulnerabilities.  Get unprecedented insight into cyber adversary groups so that your organization has predictive threat intelligence to proactively defend.