Threat Source Attribution
The situation
A security team for a public figure was receiving threatening emails from multiple anonymous accounts. Sender names varied across free email providers, and it was not clear whether one individual or several were responsible.
What we did
We analyzed full email headers across every message, traced originating IP addresses, and verified authentication chains to confirm that the messages came from the claimed providers rather than spoofed sources. We checked the source IPs against VPN, proxy, TOR, and known botnet datasets. One of the sending addresses appeared in two prior breach corpora, indicating a personal account rather than a disposable one.
What the client got
All messages traced to a single residential IP in a specific city, with no proxy indicators. Findings were packaged with full technical documentation suitable for law enforcement referral, alongside recommended next steps for ISP and provider complaints.