Skip to content Skip to navigation Skip to footer
Case studies
04 / 04

Investigating ransomware groups and their tactics

Understanding ransomware attacks and attacker tactics in Japan.

Japan 2025

Understanding to better defend

After a cyberattack, a precise picture of attacker methods and the groups behind them is essential to harden infrastructure, secure systems and build long-term resilience. Open-source investigation provides the context security teams need to act.

We help cybersecurity teams investigate ransomware groups and their tactics.

Our approach

We investigate forums, leak sites, group histories and social networks to map operating methods and contribute to attribution. The result is a clearer view of attacks and the actors behind them.

Results

By focusing on specific groups and combining open-source investigation with technical-source monitoring, we deliver tailored, actionable insight:

  • A clearer understanding of attackers and their methods

  • Trend analysis to inform defensive priorities

  • Compilation of digital traces to support attribution

More cases

Continue exploring

Explore how Sahar supports decision‑makers across different missions and sectors.

Talk to an expert

Let’s discuss your security and intelligence challenges. Our team is ready to help.

Contact us

Get in touch with our team. We will get back to you shortly.