Case studies

Real investigations. Altered details. Genuine outcomes.

A selection from more than 190 matters delivered since 2018. The ones below are published with client permission and identifying details altered for confidentiality.

馃敀 Based on real events with identifying details altered for confidentiality.

Respond

The salesperson who took the client list

A software company's first forensic investigator missed critical evidence of data theft by a departing salesperson. Our re-analysis uncovered USB transfers, CRM extraction, and evidence from old tape backups that proved the theft in Federal Court.

Federal Court
Evidence presented to Full Bench
2nd opinion
After first investigation failed
Technology 路 Digital Forensics
Respond

Getting 100 servers back online

A ransomware attack halted production across a complex business. We led the response alongside the company's IT teams, MSP, and MSSP, using networked forensics to scan approximately 100 servers and workstations.

~100
Servers and workstations scanned
NIST 800-61
Response framework applied
Manufacturing 路 Incident Response
Respond

The takeover that uncovered three months of chaos

When an Australian company acquired a foreign website and app with a large user base, strange behaviours forced the site offline. Our emergency investigation separated malicious actions from negligence across source code, cloud infrastructure, and domain records.

3
Categories of conduct identified
3 months
Of downtime explained
Technology 路 Digital Forensics
Respond

The helpdesk that helped itself

A business suspected its managed service provider was accessing commercially sensitive information without consent. Our forensic acquisition and analysis confirmed the MSP connected without explicit permission but found no evidence of data access beyond the support ticket scope.

NIST 800-86
Forensic acquisition standard applied
0
Instances of sensitive data accessed
Business Services 路 Digital Forensics
Respond

The key that never left the vault

A government department alleged that a multinational technology company had publicly disclosed a private key from a server certificate. Our investigation found the key had been protected with a password so strong it would cost millions to crack, and we delivered an Expert's Report addressing every concern.

1
Expert's Report delivered
Millions
Estimated cost to crack the key password
Government/Technology 路 Digital Forensics
Respond

One click, ten thousand targets

A targeted phishing attack compromised a marketing executive's O365 account, exposing thousands of business contacts to a coordinated phishing campaign. NDF mapped the breach, contained the spread, and coordinated with Google and Microsoft to shut down the attack infrastructure.

Thousands
Business contacts protected
1
Account confirmed as isolated compromise
Professional Services 路 Incident Response
Respond

Evidence across hemispheres

A UK cyber security firm needed forensic evidence acquired in Australia to international standards. NDF collected, encrypted, and delivered forensic copies within hours, complete with a written statement of the acquisition process.

NIST 800-86
Acquisition standard applied
Hours
Time to evidence delivery
Insurance/Legal 路 Digital Forensics
Respond

The anonymous account that wasn't

A medium-sized contractor was targeted by defamatory comments from an anonymous Facebook account. NDF analysed post metadata and patterns to narrow the suspects to four individuals. A solicitor's letter drew one extreme reaction, and the defamatory post was removed days later.

4
Suspects identified from analysis
Removed
Defamatory post taken down
Construction 路 Digital Forensics
Respond

The cameras that caught the cleaners

A building management company suspected its cleaning contractor was not performing agreed services. NDF acquired hard drive evidence, conducted motion analysis of CCTV footage across many days, and produced finished video evidence that supported contract termination.

Multiple
Days of CCTV analysed
1
Finished evidence video produced
Property/Strata 路 Digital Forensics
Respond

Unlocking a life left behind

A solicitor needed to access a deceased executive's password-protected Apple Mac to retrieve financial documents and personal photos for the family. NDF combined knowledge of the individual's life with technical bypass techniques to successfully unlock the device.

1
Device successfully unlocked
Retrieved
Financial documents recovered
Legal/Personal 路 Digital Forensics
Respond

Following the stream to its source

Video streaming servers delivering pirated content were hidden behind a CDN. NDF traced the infrastructure across jurisdictions and analysed financial records to pinpoint the company responsible, enabling the IP lawyer to take action.

1
Infringing entity identified
Multiple
Jurisdictions traced across
Media/Entertainment 路 Digital Forensics
Respond

The deleted ticket home

A regional NSW business discovered significant money was missing and a business partner had fled the country. NDF forensically examined the abandoned company laptop and recovered a deleted air ticket showing a return flight to Sydney within three months.

1
Deleted flight booking recovered
3 months
Return window identified
Small Business 路 Digital Forensics
Respond

The clock that lied

A high-tech manufacturing company suspected an employee of stealing proprietary designs. NDF found the laptop had been erased and the system clock deliberately altered to provide a misleading date. We established the likely true timeframe and enabled the company to negotiate from a position of evidence.

Confirmed
Deliberate clock manipulation detected
1
Likely erasure month established
Manufacturing 路 Digital Forensics
Respond

The breach with too many suspects

A professional services firm suffered a ransomware attack on cloud virtual servers with multiple contractors and MSPs involved. NDF confirmed files had been exfiltrated, identified the cause of the breach, and helped the firm meet its notification obligations.

1
Breach cause identified
Confirmed
File exfiltration verified
Professional Services 路 Incident Response
Respond

The filter that wasn't there

A young student was allegedly exposed to inappropriate images on a school computer. NDF assessed the school's internet safety practices and found that proper search filtering or network blocking could have prevented the incident. The school settled and established a trust fund for the student.

3
Safety control gaps identified
1
Trust fund established for student
Education 路 Digital Forensics
Respond

The court order that wasn't

A boutique litigation firm received a suspicious email disguised as a court order. Our analysis revealed the PDF contained a keylogger that no commercial virus scanner had yet identified.

Keylogger
Found in PDF attachment
0
Commercial scanners detected it
Legal 路 Incident Response
Respond

The devices that never left the room

A high net worth entrepreneur subject to a foreign court order required device inspection without any data leaving the premises. NDF conducted all acquisition, analysis, and reporting on-site with the client's agents observing, satisfying the court order while maintaining complete data security.

0
Devices removed from premises
Satisfied
Foreign court order fulfilled
Legal/International 路 Digital Forensics

Want to know more?

We can walk you through relevant examples from our experience. No obligation.

1300 123 099