top of page

Email Compromise

Mobile Phone Mock-ups

John Reuther is a seasoned investigator with a wealth of experience in uncovering and combatting email compromise schemes targeting small to medium-sized businesses and non-profit organizations. With a keen eye for detail and a relentless pursuit of justice, John has navigated the intricate web of cybercrime, shedding light on the clandestine operations of malicious actors.

 

Throughout his career, John has delved into dozens of interconnected email compromise schemes, each presenting unique challenges and complexities. Central to these investigations is the nefarious modus operandi of criminals who exploit vulnerabilities to gain unauthorized access to corporate email servers. Armed with forged billing invoices, they redirect payments to accounts under their control, leaving a trail of financial devastation in their wake.

 

The cornerstone of John’s investigative approach lies in the meticulous compilation of evidence. Through initial incident response and triage, empathetic victim interviews, and forensic analysis of compromised computer systems and email servers, he has pieced together the puzzle of illicit activity, tracing unauthorized access to internet service providers and VPN providers. Furthermore, John has skillfully tracked stolen funds from their source to their destination, unravelling the intricate pathways of financial deceit.

 

One particularly notable case saw John spearhead the seizure of hundreds of spoofed domains, which posed a significant threat to additional companies and organizations. Additionally, their efforts led to the indictment and arrest of numerous individuals involved in these criminal enterprises, underscoring their commitment to holding perpetrators accountable for their actions.

 

In addition to his investigative prowess, John is dedicated to proactive measures aimed at preventing future incidents. By offering a range of defenses, from training initiatives to technological implementations and data security measures, they empower organizations to fortify their systems against cyber threats. Moreover, John provides invaluable post-incident support, conducting thorough investigations and endeavoring to recover stolen funds, thereby mitigating the impact of cybercrime on businesses and communities.

 

With a steadfast dedication to justice and a breadth of expertise in cybercrime investigation, John is a trusted ally in the ongoing battle against digital fraud and deception.

bottom of page