A&D Forensics

A&D Forensics

You may also like

Molly Wical
Molly Wical

Financial & Blockchain Forensics, AML/CFT Compliance Monitoring, Regulatory Supervision Solution

14/06/2024

๐—ž๐—ป๐—ผ๐˜„ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐˜€: ๐—ง๐—ต๐—ฒ ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ง๐—ผ๐—ฝ ๐Ÿญ๐Ÿฌ

๐˜ผ07: ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐˜ผ๐™ช๐™ฉ๐™๐™š๐™ฃ๐™ฉ๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™๐™–๐™ž๐™ก๐™ช๐™ง๐™š๐™จ
Understanding and addressing identification and authentication failures is crucial for securing your applications. How well are you ensuring proper identification and authentication are implemented in your solutions?

๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—œ๐——&๐—”?
Identification and Authentication (ID&A) Failures occur when weaknesses in web application login processes allow for unauthorized access. For instance, a weak password policy that permits easily guessable passwords may lead to compromised user accounts.

๐—›๐—ผ๐˜„ ๐—ถ๐˜ ๐—ช๐—ผ๐—ฟ๐—ธ๐˜€:
In this scenario, attackers exploit weak authentication mechanisms by guessing or cracking passwords, gaining unauthorized entry into user accounts. This unauthorized access can result in various detrimental impacts, including data theft, manipulation, or account takeover, compromising user identities and damaging the application's reputation.

๐—›๐—ผ๐˜„ ๐——๐—ผ ๐—ฌ๐—ผ๐˜‚ ๐— ๐—ถ๐˜๐—ถ๐—ด๐—ฎ๐˜๐—ฒ?
To mitigate this vulnerability, organizations should:
1๏ธโƒฃ Implement robust password policies, enforcing minimum complexity requirements and periodic resets.
2๏ธโƒฃ Deploy multi-factor authentication (MFA) and account lockout mechanisms for additional layers of security.

๐—ง๐—ฎ๐—ธ๐—ฒ ๐—”๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ก๐—ผ๐˜„!
Contact us at A&D Forensics for pe*******on testing and vulnerability assessment of your platform

13/06/2024

๐ƒ๐ข๐ฌ๐œ๐จ๐ฏ๐ž๐ซ ๐ญ๐ก๐ž ๐Ÿ“ ๐๐ข๐ฅ๐ฅ๐š๐ซ๐ฌ ๐จ๐Ÿ ๐š ๐‘๐จ๐›๐ฎ๐ฌ๐ญ ๐€๐Œ๐‹/๐‚๐…๐“ ๐‚๐จ๐ฆ๐ฉ๐ฅ๐ข๐š๐ง๐œ๐ž ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ! ๐Ÿ”

A strong AML/CFT compliance program is essential for preventing, detecting, and deterring money laundering and terrorist financing.

Todayโ€™s infographic illustrates the key components that should be documented and include comprehensive policies, procedures, and controls. These measures need to be tailored to your organizationโ€™s size, structure, risk level, and product complexity.

Neglecting to establish, implement, and maintain these policies, procedures, and controls can result in severe enforcement actions against your organization or its individuals.

As a Web3 start-up, we recognize the unique compliance challenges you encounter. The A&D Forensics team is ready to support all your crypto compliance needs. Contact us today!

๐Ÿ“ง [email protected]

12/06/2024

Happy Democracy Day, Nigeria!๐Ÿ‡ณ๐Ÿ‡ฌ

As we commemorate this special day, we remain dedicated to ensuring and integrity within Nigeria's financial system and ecosystem.

11/06/2024

๐Ÿ•ต๏ธโ€โ™‚๏ธ๐‚๐ก๐ž๐œ๐ค ๐จ๐ฎ๐ญ ๐จ๐ฎ๐ซ #๐œ๐จ๐ฆ๐ฉ๐ฅ๐ข๐š๐ง๐œ๐ž ๐ ๐ฅ๐จ๐ฌ๐ฌ๐š๐ซ๐ฒ ๐ข๐ง๐Ÿ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐ญ๐จ ๐ฅ๐ž๐š๐ซ๐ง ๐š๐›๐จ๐ฎ๐ญ ๐๐„๐๐ฌ, ๐’๐ˆ๐๐ฌ, ๐š๐ง๐ ๐’๐ˆ๐„๐ฌ! ๐Ÿ“œ

As part of customer due diligence, compliance officers not only verify identities but also check for signs of higher money laundering risks. This includes looking at political status, negative news reports, personal or professional connections, and suspected criminal activity.

In certain circumstances, these high-risk customers are known as ๐—ฃ๐—ผ๐—น๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐—ฒ๐—ฑ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐˜€ (PEPs), ๐—ฆ๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐—น ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฒ๐˜€๐˜ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐˜€ (SIPs), and ๐—ฆ๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐—น ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฒ๐˜€๐˜ ๐—˜๐—ป๐˜๐—ถ๐˜๐—ถ๐—ฒ๐˜€ (SIEs). They could appear like similar terms but they actually differ๐Ÿ‘Œ !

Stay vigilant and informed to safeguard your operations from these significant risks. Ready to fortify your knowledge and ensure your organization stays compliant? Engage with us for top-tier compliance trainings and consultations today! ๐Ÿ’ผ

06/06/2024

๐“๐ก๐ž ๐…๐๐ˆ (๐…๐ž๐๐ž๐ซ๐š๐ฅ ๐๐ฎ๐ซ๐ž๐š๐ฎ ๐จ๐Ÿ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง) has recently warned of a rise in ๐ฐ๐จ๐ซ๐ค-๐Ÿ๐ซ๐จ๐ฆ-๐ก๐จ๐ฆ๐ž ๐ฃ๐จ๐› ๐š๐๐ฏ๐ž๐ซ๐ญ๐ข๐ฌ๐ž๐ฆ๐ž๐ง๐ญ ๐ฌ๐œ๐š๐ฆ๐ฌ. Scammers may reach out to you through calls or messages, offering seemingly easy jobs like rating restaurants or "optimizing" services with a simple click.

Scammers might create a fake interface that shows you're making money, even though you can't withdraw it. If they ask you to pay with cryptocurrency to continue working, it's a major warning sign that it's not a legitimate job but rather a scam to siphon your money.

๐’๐ญ๐š๐ฒ ๐’๐š๐Ÿ๐ž ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐“๐ข๐ฉ๐ฌ:
๐Ÿ‘‰ Be cautious of unsolicited job offers; avoid clicking on links or downloading attachments.
๐Ÿ‘‰ Don't trust services promising to recover lost cryptocurrency.
๐Ÿ‘‰ Never share financial or personal information with unknown job offers.

๐–๐ก๐š๐ญ ๐๐จ ๐ฒ๐จ๐ฎ ๐ญ๐ก๐ข๐ง๐ค ๐ญ๐ก๐ž ๐‘๐ž๐ ๐Ÿ๐ฅ๐š๐ ๐ฌ ๐š๐ซ๐ž? ๐…๐ž๐ž๐ฅ ๐Ÿ๐ซ๐ž๐ž ๐ญ๐จ ๐ฌ๐ก๐š๐ซ๐ž ๐ข๐ง ๐ญ๐ก๐ž ๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐ญ๐ฌ

Let's keep each other informed and protected against these scams!
News Source: https://buff.ly/3X847yl

06/06/2024

๐Ÿค” ๐€๐ซ๐ž ๐ฒ๐จ๐ฎ ๐ฌ๐ญ๐ข๐ฅ๐ฅ ๐ซ๐ž๐ฅ๐ฒ๐ข๐ง๐  ๐จ๐ง ๐จ๐ฎ๐ญ๐๐š๐ญ๐ž๐ ๐ฌ๐จ๐Ÿ๐ญ๐ฐ๐š๐ซ๐ž ๐จ๐ง ๐ฒ๐จ๐ฎ๐ซ ๐๐ž๐ฏ๐ข๐œ๐ž?

Vulnerable and Outdated Components involve using outdated software components in web applications. For instance, utilizing an older version of a JavaScript library with known security flaws can expose the application to attacks.

๐–๐ก๐š๐ญ'๐ฌ ๐ญ๐ก๐ž ๐ข๐ฆ๐ฉ๐š๐œ๐ญ? Outdated components present significant risks, as attackers can exploit vulnerabilities in outdated components to compromise user data or gain unauthorized access. Security breaches may occur, leading to data theft, content manipulation, or service disruption.

๐“๐จ ๐ฆ๐ข๐ญ๐ข๐ ๐š๐ญ๐ž this vulnerability, organizations should prioritize regular updates of software components, libraries, and frameworks. Employing automated dependency monitoring tools and conducting comprehensive security testing are essential measures to identify and address vulnerabilities promptly.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:

๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]

05/06/2024

๐Ÿ“ข ๐–๐ž ๐š๐ซ๐ž ๐ฉ๐ฅ๐ž๐š๐ฌ๐ž๐ ๐ญ๐จ ๐š๐ง๐ง๐จ๐ฎ๐ง๐œ๐ž ๐ญ๐ก๐š๐ญ ๐ซ๐ž๐ ๐ข๐ฌ๐ญ๐ซ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ซ๐ž ๐ง๐จ๐ฐ ๐จ๐ฉ๐ž๐ง ๐Ÿ๐จ๐ซ ๐จ๐ฎ๐ซ ๐ง๐ž๐ฑ๐ญ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐ž๐ ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐œ๐ฎ๐ซ๐ซ๐ž๐ง๐œ๐ฒ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐จ๐ซ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !

Whether you're a beginner or an experienced investigator, this training equips you with the skills to understand and analyze digital currencies.

Join us for a comprehensive exploration of crypto investigations, covering everything from blockchain fundamentals to advanced forensic techniques.

Hurry up, send a DM, and register now, as available slots are limited!

Understand,trace and investigate cryptocurrency related crimes with A&D Foreniscs. For more details and to register: ๐Ÿ‘‰ https://buff.ly/3yi64KT

04/06/2024

The Joint interVASP Standards Working Group (ISWG) has released an update to interVASP Messaging Standard 101 (IVMS101), the universal standard for virtual asset service providers (VASPs) to communicate required originator and beneficiary info known globally as Travel Rule.

Originally developed by a cross-industry group of 130 technical experts including our Senior Partner Adedeji Owonibi and released in May 2020, IVMS101 addresses the Financial Action Task Force (FATF)'s requirement for VASPs to transmit and receive personal originator and beneficiary information with each crypto transaction, known as the Travel Rule. Since then, it has become the go-to data model for leading Travel Rule solution providers.

In April 2023, GDF, OpenVASP and VASPnet joined forces in a Joint Working Group to maintain and further develop the existing IVMS101 standard to create greater consistency and integrity within the crypto ecosystem.

The ISWG came together in April 2023 to address:

various errors,
implementation challenges, and
enhancements that were identified and proposed by technical subject-matter experts during the adoption process.
A draft of proposed changes to IVMS101.2013 was released for consultation in July 2023. The ISWG has now ratified the proposed changes to provide a more usable, effective and complete universal common language for transmitting Travel Rule-mandated data.

you can read the updates herehttps://cdn.prod.website-files.com/648841abc97f28489cc3f2ce/6656e9c60c3029989dcd7431_IVMS101.2023%20interVASP%20data%20model%20standard.pdf

03/06/2024

While addressing the attendees of the Cryptoverse Summit organized by Wakanda in Mauritius, our Blockchain Forensics Specialist, Chioma Onyekelu, CCI, delivered a presentation on the role of blockchain intelligence in combating financial crimes.

Blockchain intelligence refers to the process of analyzing blockchain data to identify patterns, detect suspicious activities, and trace the flow of funds across the blockchain network.

As a blockchain intelligence company, A&D Forensics leverages various blockchain analytic tools from our partners to mitigate fraud, ensure crypto compliance, and investigate cryptocurrency-related crimes. We work with Web 3 startups, crypto businesses, law enforcement agencies, regulators, and financial institutions.

If you are interested in collaborating with us this June, please reach out to us at [email protected]. We look forward to partnering with you to enhance the security and integrity of your blockchain operations.

30/05/2024

๐˜๐ž๐ฌ๐ญ๐ž๐ซ๐๐š๐ฒ, ๐Œ๐š๐ฒ ๐Ÿ๐Ÿ—, ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ’, ๐ฆ๐š๐ซ๐ค๐ž๐ ๐Ÿ— ๐ฒ๐ž๐š๐ซ๐ฌ ๐ฌ๐ข๐ง๐œ๐ž ๐‘๐จ๐ฌ๐ฌ ๐”๐ฅ๐›๐ซ๐ข๐œ๐ก๐ญ'๐ฌ ๐ฌ๐ž๐ง๐ญ๐ž๐ง๐œ๐ข๐ง๐ . ๐”๐ฅ๐›๐ซ๐ข๐œ๐ก๐ญ ๐ฐ๐š๐ฌ ๐œ๐จ๐ง๐ฏ๐ข๐œ๐ญ๐ž๐ ๐Ÿ๐จ๐ซ ๐œ๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐ญ๐ก๐ž ๐๐š๐ซ๐ค๐ง๐ž๐ญ ๐ฆ๐š๐ซ๐ค๐ž๐ญ๐ฉ๐ฅ๐š๐œ๐ž ๐’๐ข๐ฅ๐ค ๐‘๐จ๐š๐.

Ulbricht received a life sentence without the possibility of parole on May 29, 2015, and was implicated in murder-for-hire plots, although no murders occurred. His appeals were unsuccessful, and he remains in prison to this day.

In 2021, Ross Ulbricht and his prosecutors agreed that Ulbricht would give up any claim to 50,676 Bitcoin (worth nearly $3.4 billion) seized from a hacker. The Bitcoin, stolen from Silk Road in 2013, was traced and seized by the U.S. government. The funds would be used to pay off Ulbricht's $183 million debt in his criminal case, with the Department of Justice taking custody of the Bitcoin.

This highlights the pseudonymous nature of Bitcoin and the ability of law enforcement agents and crypto investigators to trace and investigate cryptocurrency-related crimes.

A&D Forensics is available to assist victims who have lost their cryptocurrency assets and to support law enforcement agents with cryptocurrency investigations.

Open an investigation case with us here:https://buff.ly/3JsXBLD

29/05/2024

๐ŸฅณWe are excited to share the fantastic testimonials from our last Crypto Compliance Specialist training!

Our participants expressed their gratitude for the valuable skills and insights gained, which have empowered them to confidently tackle challenges and achieve success in their roles as a compliance officers.

And that's not all, we are also pleased to announce that our ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐ž๐ ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐œ๐ฎ๐ซ๐ซ๐ž๐ง๐œ๐ฒ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง (๐‚๐‚๐ˆ) ๐ญ๐ซ๐š๐ข๐ง๐ข๐ง๐  is scheduled for this quarter.

Visit our for website for more details on our trainings ( CCI and 3CS) via: https://adforensics.com.ng/training/

27/05/2024

๐‡๐š๐ฏ๐ž ๐ฒ๐จ๐ฎ ๐ญ๐š๐ค๐ž๐ง ๐ญ๐ก๐ž ๐ญ๐ข๐ฆ๐ž ๐ญ๐จ ๐ซ๐ž๐ฏ๐ข๐ž๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐œ๐จ๐ง๐Ÿ๐ข๐ ๐ฎ๐ซ๐š๐ญ๐ข๐จ๐ง ๐š๐ฌ ๐ฐ๐ž ๐›๐ž๐ ๐ข๐ง ๐š ๐ง๐ž๐ฐ ๐ฐ๐ž๐ž๐ค? Learn about the potential costs of security misconfiguration and how to prevent it.

What is security misconfiguration?

Security misconfiguration, a prevalent vulnerability in the OWASP Top 10, involves improperly configured settings that leave systems vulnerable to exploitation. For example, in a web application scenario, default credentials left unchanged can lead to unauthorized access to administrative functions.

The impact of such misconfigurations is significant, potentially resulting in unauthorized access to sensitive data or even full system compromise. Attackers exploiting default credentials can manipulate or exfiltrate data, compromising system integrity and confidentiality.

To mitigate security misconfigurations, organizations should implement robust authentication mechanisms, conduct regular configuration reviews, and adhere to the principle of least privilege. By addressing misconfigurations promptly, organizations can strengthen their defenses and minimize the risk of unauthorized access and data compromise.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing services or contact us via the following:

๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-3040

Stay tuned as we share the rest of the OWASP Top 10 series in the coming days.

23/05/2024

๐Ÿคทโ€โ™€๏ธ๐€๐ซ๐ž ๐ฒ๐จ๐ฎ ๐š๐ฐ๐š๐ซ๐ž ๐ญ๐ก๐š๐ญ ๐ฒ๐จ๐ฎ ๐œ๐จ๐ฎ๐ฅ๐ ๐ฎ๐ง๐ข๐ง๐ญ๐ž๐ง๐ญ๐ข๐จ๐ง๐š๐ฅ๐ฅ๐ฒ ๐จ๐ซ ๐ค๐ง๐จ๐ฐ๐ข๐ง๐ ๐ฅ๐ฒ ๐›๐ž ๐š ๐ฆ๐จ๐ง๐ž๐ฒ ๐ฆ๐ฎ๐ฅ๐ž?

Recently, U.S. law enforcement took action against more than 3,000 money mules in an initiative to disrupt transnational fraud schemes.

This initiative aims to identify, disrupt, and prosecute networks of individuals who transfer funds from fraud victims to international fraudsters, as fraudsters depend on money mules to facilitate various fraud schemes.

๐Ÿšฉ Here are some red flags that you are being asked to be a money mule, according to the FBI:
๐Ÿ‘‰ Someone you donโ€™t know contacts you over email or social media, promising a way to earn money with little to no effort.๐Ÿ“ง
๐Ÿ‘‰ You receive a job offer from an employer who uses web-based email services such as Gmail or Yahoo.๐Ÿ’ผ
๐Ÿ‘‰ You are asked to receive money in your personal bank account, then transfer the money to another source.๐Ÿฆ

Visit our blog page to gain more knowledge about money mule:๐Ÿ‘‡
https://buff.ly/48OiRVo

News Source:
https://buff.ly/4dURz36
https://buff.ly/3XbF2mf

22/05/2024

๐ƒ๐จ ๐ฒ๐จ๐ฎ ๐ฐ๐ข๐ฌ๐ก ๐ญ๐จ ๐ฎ๐ง๐๐ž๐ซ๐ฌ๐ญ๐š๐ง๐ ๐’๐ก๐ž๐ฅ๐ฅ, ๐’๐ก๐ž๐ฅ๐Ÿ, ๐š๐ง๐ ๐…๐ซ๐จ๐ง๐ญ ๐‚๐จ๐ฆ๐ฉ๐š๐ง๐ข๐ž๐ฌ? ๐‘๐ž๐š๐ ๐จ๐ฎ๐ซ ๐ข๐ง๐Ÿ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐ญ๐จ ๐ฅ๐ž๐š๐ซ๐ง ๐ฆ๐จ๐ซ๐ž.

For Web3 startups and compliance officers, understanding the distinctions between these companies is crucial for maintaining regulatory compliance and safeguarding your organizationโ€™s integrity.

๐Ÿšจ Take Action by conducting thorough due diligence and compliance checks to avoid legal pitfalls and ensure you're not inadvertently facilitating illicit activities.

At A&D Forensics, we are here to offer you our assistance with your compliance needs. Our Compliance As A Service (CaaS) can elevate your compliance strategy, ensuring a secure and compliant future in the crypto world.

๐Ÿ“žContact us today to learn more: https://buff.ly/3WUYl2P

21/05/2024

Moving forward with the '๐Š๐ง๐จ๐ฐ ๐˜๐จ๐ฎ๐ซ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ' series: Top 10. Today, we will be exploring a prevalent and critical attack type:๐ˆ๐ง๐ฌ๐ž๐œ๐ฎ๐ซ๐ž ๐ƒ๐ž๐ฌ๐ข๐ ๐ง ๐Ÿšง๐Ÿ’ก.

Insecure design in web applications stems from fundamental flaws in architecture or implementation, posing a significant overall security risk. For instance, an online shopping platform may lack multi-factor authentication and store passwords insecurely, exposing accounts to compromise.

๐“๐ก๐ž ๐ข๐ฆ๐ฉ๐š๐œ๐ญ? This scenario allows attackers to exploit weak authentication mechanisms and gain unauthorized access to user accounts, potentially leading to data breaches and fraudulent activity. Consequently, insecure design not only jeopardizes user security but also tarnishes the platform's reputation and erodes user trust.

๐‡๐จ๐ฐ ๐ญ๐จ ๐ฆ๐ข๐ญ๐ข๐ ๐š๐ญ๐ž: To mitigate insecure design vulnerabilities, developers should implement multi-factor authentication, securely store passwords, and conduct regular security assessments. These proactive measures enhance the platform's security posture, protecting user data and maintaining trust and confidence among users.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:
๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-3040

17/05/2024

๐’๐ญ๐ข๐ฅ๐ฅ ๐›๐ฎ๐ณ๐ณ๐ข๐ง๐  ๐Ÿ๐ซ๐จ๐ฆ ๐ญ๐ก๐ž ๐ข๐ง๐œ๐ซ๐ž๐๐ข๐›๐ฅ๐ž ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐š๐ญ ๐ญ๐ก๐ž ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ฏ๐ž๐ซ๐ฌ๐ž ๐ฌ๐ฎ๐ฆ๐ฆ๐ข๐ญ ๐ข๐ง ๐Œ๐š๐ฎ๐ซ๐ข๐ญ๐ข๐ฎ๐ฌ!๐ŸŒŸ

Check out our booth setup and catch a glimpse of the action. A&D Forensics is all set to support Mauritians and the entire African continent with our top-notch services!

Calling all African web3 startups! If you're in need of expert assistance in crypto compliance, investigation, cybersecurity, or corporate training, look no further.

Reach out to us at [email protected] and let's collaborate for success! ๐Ÿš€

Photos from A&D Forensics's post 17/05/2024

๐ŸŽ‰๐ˆ๐ญโ€™๐ฌ ๐…๐ซ๐ข๐๐š๐ฒ, ๐š๐ง๐ ๐ฐ๐ž ๐œ๐š๐ง'๐ญ ๐ ๐ž๐ญ ๐จ๐ฏ๐ž๐ซ ๐จ๐ฎ๐ซ ๐ˆ๐๐“๐„๐‘๐๐Ž๐‹ ๐ญ๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐ก๐ž๐ฅ๐ ๐ฅ๐š๐ฌ๐ญ ๐ฐ๐ž๐ž๐ค.

20 Senior INTERPOL officers received training from A&D Forensics in collaboration with the Africa Stablecoin Consortium (ASC). This training exposed these officers to how cryptocrimes can be traced, as well as the role of regulated stablecoins in mitigating cryptocrimes.

Corporate training is our expertise, and we excel at it. Are you looking for a reputable, experienced partner for your corporate training needs?

โœ… Feel free to send us a DM or reach out to us today at [email protected]

15/05/2024

๐’๐จ๐ง๐ง๐ž ๐…๐ข๐ง๐š๐ง๐œ๐ž ๐‹๐จ๐ฌ๐ญ $๐Ÿ๐ŸŽ๐Œ ๐ญ๐จ โ€œ๐ƒ๐จ๐ง๐š๐ญ๐ข๐จ๐ง ๐€๐ญ๐ญ๐š๐œ๐คโ€๐Ÿ˜ฑ

๐Ÿค”What exactly is a donation attack?

A donation attack refers to exploiting a vulnerability in smart contracts, where incoming transfers cannot be rejected by contracts. This vulnerability can be manipulated to force balance updates and impact the logic of the contract.This attack exploits the design flaw in ERC-20 tokens.

This flaw allows contracts to accept transfers without the ability to reject them. Because of this, attackers can alter a contract's balance and manipulate its behavior, potentially resulting in the loss of funds.

๐Ÿ”’ For your smart contracts audit, A&D Forensics offers expert services.

๐Ÿ‘‰ Reach out today to protect your contracts:https://adforensics.com.ng/audit-services/

News Source: https://medium.com//post-mortem-sonne-finance-exploit-12f3daa82b06

15/05/2024

๐Ÿ˜Still on the 'Know Your Vulnerability' series: Top 10. Today, we will be exploring a prevalent and critical attack type: Injection ๐Ÿ’‰๐Ÿ’ป.

๐–๐ก๐š๐ญ ๐ข๐ฌ ๐ข๐ง๐ฃ๐ž๐œ๐ญ๐ข๐จ๐ง? Injection is a critical vulnerability where untrusted data is improperly handled, allowing attackers to execute unintended commands or access unauthorized data. For instance, in a scenario where a web application dynamically constructs SQL queries without proper input validation, attackers can exploit this vulnerability through SQL injection.

๐ˆ๐ฆ๐ฉ๐š๐œ๐ญ:Exploiting SQL injection, attackers inject malicious SQL queries into input fields, bypassing authentication mechanisms or modifying database queries to retrieve, delete, or disclose sensitive information. This can lead to data loss, unauthorized access, and denial of service, compromising the integrity, confidentiality, and availability of the application and its data.

๐Œ๐ข๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง:To mitigate SQL injection vulnerabilities effectively, developers should implement parameterized queries or prepared statements to separate SQL code from user input. Additionally, strict input validation and sanitization routines should be enforced to filter out malicious characters and prevent injection attacks. Limiting database permissions, configuring database servers securely, and conducting regular security testing are essential measures to mitigate the risk of injection vulnerabilities and protect web applications from exploitation.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:

๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-3040

๐Ÿ’ป๐Ÿ”’

Photos from A&D Forensics's post 14/05/2024

๐Ÿ“ข We are excited to announce that A&D Forensics will be live at the 3rd Edition of the Cryptoverse Summit as a Cardano sponsor in Mauritius.

Our Blockchain Forensics Specialist, Chioma Onyekelu, will be participating in panel discussion 5, delving into the topic of Crypto Compliance For Banks & Financial Institutions.

Join us at the summit and be sure to stop by our booth to connect with professionals worldwide.

For Blockchain intelligence services, contact us at [email protected].

13/05/2024

As we commence a new week today, let's explore one of the Open Web Application Security Project (OWASP) Top 10 series. Join us as we shine a spotlight on Cryptographic Failures and their impact on web application security.

๐–๐ก๐š๐ญ ๐ข๐ฌ ๐œ๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐…๐š๐ข๐ฅ๐ฎ๐ซ๐ž?
Cryptographic Failures in web applications stem from improper implementation, like using weak hashing algorithms without salting passwords. This leads to vulnerabilities where attackers can retrieve plaintext passwords, compromising user accounts and facilitating credential stuffing attacks.
๐ˆ๐ฆ๐ฉ๐š๐œ๐ญ:
The impact includes unauthorized access to sensitive information, such as user accounts, and the potential for widespread account takeover.
๐Œ๐ข๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง:
To mitigate, developers should use strong cryptographic hashing algorithms, implement robust key management practices, and conduct regular security testing to identify and address vulnerabilities promptly.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:
๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-3040

Stay tuned as we share the rest of the OWASP Top 10 series in the coming days.๐Ÿ˜‰

10/05/2024

A&D Forensics in partnership with Africa Stablecoin Consortium trains senior INTERPOL officers in Nigeria

10/05/2024

Yesterday, A&D Forensics in partnership with Africa Stablecoin Consortium trained 20 INTERPOL Nigeria officers at the A&D Forensics Digital Lab.

โœ…This training with INTERPOL Nigeria underscores the importance of collective action in addressing the complex challenges posed by cryptocrimes.

๐ŸŽฅ Watch the press brief held during the training to learn more about our collaboration with INTERPOL and the strategies discussed to combat cryptocrimes. Don't miss out!

โœ…For inquiries about corporate trainings with A&D Forensics , reach out to us today at [email protected]!

cc: Adedeji Owonibi Chioma Onyekelu, CCI Ogedegbe Uyoyo Abdulhafiz Ibrahim, CCI

Photos from A&D Forensics's post 09/05/2024

๐€&๐ƒ ๐…๐จ๐ซ๐ž๐ง๐ฌ๐ข๐œ๐ฌ, ๐ข๐ง ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐จ๐ง ๐ฐ๐ข๐ญ๐ก ๐ญ๐ก๐ž ๐€๐Ÿ๐ซ๐ข๐œ๐š ๐’๐ญ๐š๐›๐ฅ๐ž๐œ๐จ๐ข๐ง ๐‚๐จ๐ง๐ฌ๐จ๐ซ๐ญ๐ข๐ฎ๐ฆ (๐€๐’๐‚), ๐ฐ๐ข๐ฅ๐ฅ ๐œ๐จ๐ง๐๐ฎ๐œ๐ญ ๐ญ๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐ˆ๐๐“๐„๐‘๐๐Ž๐‹ ๐ญ๐จ๐๐š๐ฒ.

We are gearing up to host and train esteemed INTERPOL members on Mitigating Cryptocrimes Using Regulated Stablecoins.

Eager to share our expertise in combating digital threats, let's join forces to protect our digital environment.

02/05/2024

๐ƒ๐จ ๐ฒ๐จ๐ฎ ๐ค๐ง๐จ๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐š๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง'๐ฌ ๐ฏ๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ข๐ž๐ฌ?

In the coming days, we'll be looking at the top 10 vulnerabilities in the Open Web Application Security Project (OWASP)Top 10 series.

๐๐ซ๐จ๐ค๐ž๐ง ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ

What is Broken Access Control? This refers to a critical web application vulnerability where users can access unauthorized functionality or sensitive data due to inadequate access controls. In a practical scenario, consider an online banking system where a user discovers they can view the account balance of any user by manipulating the URL parameters. Additionally, they find they can transfer funds between accounts without proper authentication or authorization, leading to potential financial loss and regulatory compliance issues.

๐ˆ๐ฆ๐ฉ๐š๐œ๐ญ: The impact of such vulnerabilities includes unauthorized data access, financial loss, regulatory non-compliance, and reputational damage.

๐Œ๐ข๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ข๐ž๐ฌ: These include implementing role-based access control, enforcing the principle of least privilege, implementing strong access controls, conducting regular security audits, and providing security awareness training to personnel.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:
๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-304

01/05/2024

Happy New Month of May! ๐ŸŒผ

Today, we celebrate all workers in the financial crime profession: the fraud examiners, law enforcement agents, and compliance officers!

The A&D Forensics team wishes you a month filled with success, growth, and appreciation for all you do.

Stay with us here for insightful regulatory updates as we serve you this May!

What is Peel Chain in Cryptocurrency Scam? 29/04/2024

๐—›๐—ฎ๐˜ƒ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐—ต๐—ฒ๐—ฎ๐—ฟ๐—ฑ ๐—ผ๐—ณ ๐—ฃ๐—ฒ๐—ฒ๐—น ๐—–๐—ต๐—ฎ๐—ถ๐—ป๐˜€? ๐—ช๐—ต๐—ฎ๐˜ ๐—ฒ๐˜…๐—ฎ๐—ฐ๐˜๐—น๐˜† ๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ต๐—ฒ๐˜†, ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐˜†๐—ผ๐˜‚ ๐—ฏ๐—ฒ ๐—ฐ๐—ผ๐—ป๐—ฐ๐—ฒ๐—ฟ๐—ป๐—ฒ๐—ฑ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ๐—บ?

In a Peel Chain, a small portion is "peeled" from the subject's address in a low-value transfer, split into multiple outputs through different wallets, often directed to exchanges where they can be converted to fiat currency (e.g., dollars) or other assets.

๐Ÿ˜Now, imagine being a victim of a wallet hack, and the criminal gradually "peels" your funds to prevent you from noticing. Interesting, right ?

No worries, dive in and learn more about โ€œPeelchainsโ€ in our brief informative content here: https://buff.ly/44BiqgF

What is Peel Chain in Cryptocurrency Scam? Peel chain is a technique used to launder large amounts of illegally obtained cryptocurrency by funding a long someoneโ€™s assets in multipleโ€ฆ

Photos from A&D Forensics's post 25/04/2024

๐‹๐š๐ฌ๐ญ ๐ฆ๐จ๐ง๐ญ๐ก, ๐€&๐ƒ ๐…๐จ๐ซ๐ž๐ง๐ฌ๐ข๐œ๐ฌ ๐ญ๐ซ๐š๐ข๐ง๐ž๐ ๐จ๐ฏ๐ž๐ซ ๐Ÿ๐Ÿ๐ŸŽ ๐ฆ๐ž๐๐ข๐œ๐š๐ฅ ๐ฉ๐ซ๐จ๐Ÿ๐ž๐ฌ๐ฌ๐ข๐จ๐ง๐š๐ฅ๐ฌ ๐š๐ญ ๐ญ๐ก๐ž ๐๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐‡๐จ๐ฌ๐ฉ๐ข๐ญ๐š๐ฅ ๐ข๐ง ๐€๐›๐ฎ๐ฃ๐š.

During this training, A&D Forensics leveraged its training experience and wealth of knowledge from different partners to deliver a 2-day practical-led workshop for the participants.

At A&D Forensics, our expertise is your advantage. Our team of seasoned professionals is well-equipped to deliver structured, high-impact corporate training that aligns perfectly with your team's goals.

Whether you need in-depth knowledge on Blockchain/Crypto Compliance and Investigations, AML strategies, or Cybersecurity best practices, we have the expertise to make it happen.

Schedule your corporate training with A&D Forensics today!
๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-0909550-3040

Cc: Adedeji Owonibi; Chioma Onyekelu, CCI ; Abdulhafiz Ibrahim

24/04/2024

๐Ÿค” ๐„๐ฏ๐ž๐ซ ๐ฐ๐จ๐ง๐๐ž๐ซ๐ž๐ ๐ฐ๐ก๐š๐ญ ๐ฌ๐ž๐ญ๐ฌ ๐ฎ๐ฌ ๐š๐ฉ๐š๐ซ๐ญ ๐ข๐ง ๐ญ๐ก๐ž ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฐ๐จ๐ซ๐ฅ๐? ๐‹๐ž๐ญ'๐ฌ ๐›๐ซ๐ž๐š๐ค ๐ข๐ญ ๐๐จ๐ฐ๐ง:

๐Ÿ‘ฉโ€๐Ÿ’ผ๐„๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž๐ ๐“๐ž๐š๐ฆ: Our team of cybersecurity professionals brings years of experience and expertise to every engagement.
๐ŸŽฏ ๐“๐š๐ข๐ฅ๐จ๐ซ๐ž๐ ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ: We understand that every organization has a unique product/solution, which is why we tailor our services to meet your specific requirements without compromising quality.
๐Ÿงพ ๐‚๐จ๐ฆ๐ฉ๐ซ๐ž๐ก๐ž๐ง๐ฌ๐ข๐ฏ๐ž ๐‘๐ž๐ฉ๐จ๐ซ๐ญ๐ข๐ง๐ : Our detailed reports don't just contain findings but also provide actionable and easy to follow recommendations to strengthen your organization's security posture.
๐Ÿ’ช ๐Ž๐ง๐ ๐จ๐ข๐ง๐  ๐’๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ: We're committed to your organization's success, as such we offer continuous support to ensure your cybersecurity defenses remain robust and effective.

Visit us today at https://buff.ly/4b0w4vp for your vulnerability assessment and pe*******on testing service or contact us via the following:
๐ŸŒ Website: https://buff.ly/3J14GCS
๐Ÿ“ง Email: [email protected]
๐Ÿ“ž Phone: +234-909550-3040

23/04/2024

๐Ÿค” ๐ƒ๐ข๐ ๐ฒ๐จ๐ฎ ๐ค๐ง๐จ๐ฐ ๐ญ๐ก๐š๐ญ ๐๐ข๐ง๐š๐ง๐œ๐ž ๐„๐ฑ๐œ๐ก๐š๐ง๐ ๐ž ๐ง๐ž๐š๐ซ๐ฅ๐ฒ ๐ฅ๐จ๐ฌ๐ญ ๐Ÿ๐ŸŽ ๐ฆ๐ข๐ฅ๐ฅ๐ข๐จ๐ง ๐”๐’๐ƒ๐“ ๐ญ๐จ ๐š ๐ณ๐ž๐ซ๐จ ๐ญ๐ซ๐š๐ง๐ฌ๐Ÿ๐ž๐ซ ๐ฌ๐œ๐š๐ฆ? Even a top-tier cryptocurrency exchange like Binance isn't immune to these sophisticated schemes๐Ÿคท .

But it's not just crypto exchanges. Last year, a staggering $๐Ÿฑ๐Ÿฑ,๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐—จ๐—ฆ๐——๐—ง ๐˜„๐—ฎ๐˜€ ๐˜€๐˜๐—ผ๐—น๐—ฒ๐—ป ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ฎ ๐——๐—˜๐—” ๐—ฎ๐—ด๐—ฒ๐—ป๐˜, and$๐Ÿฑ ๐—บ๐—ถ๐—น๐—น๐—ถ๐—ผ๐—ป ๐˜ƒ๐—ฎ๐—ป๐—ถ๐˜€๐—ต๐—ฒ๐—ฑ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ฆ๐—ฎ๐—ณ๐—ฒ ๐—ช๐—ฎ๐—น๐—น๐—ฒ๐˜ ๐—ฐ๐˜‚๐˜€๐˜๐—ผ๐—บ๐—ฒ๐—ฟ๐˜€, all thanks to zero transfer scams. (๐™๐™š๐™›๐™š๐™ง๐™š๐™ฃ๐™˜๐™š๐™จ ๐™ž๐™ฃ ๐™˜๐™ค๐™ข๐™ข๐™š๐™ฃ๐™ฉ๐™จ)

โœ… Now, Etherscan is fighting back with a new PopUp reminder feature. This tool alerts users to potential duplicate addresses involved in zero token transfers, adding a crucial layer of security.

๐Ÿคท What exactly is a zero transfer scam? ๐Ž๐ฎ๐ซ ๐†๐ฅ๐จ๐ฌ๐ฌ๐š๐ซ๐ฒ ๐ ๐ข๐ฏ๐ž๐ฌ ๐ฒ๐จ๐ฎ ๐š ๐ฉ๐ž๐ซ๐Ÿ๐ž๐œ๐ญ ๐๐ž๐Ÿ๐ข๐ง๐ข๐ญ๐ข๐จ๐ง!

And if you want to learn more about Zero Transfer Scams, hereโ€™s an insightful article for you to read:https://buff.ly/4d88nn0

If you become a crypto scam victim, open a case with us for possible investigations here: https://buff.ly/3JsXBLD

Want your business to be the top-listed Business in Abuja?
Click here to claim your Sponsored Listing.

Videos (show all)

๐’๐ญ๐ข๐ฅ๐ฅ ๐›๐ฎ๐ณ๐ณ๐ข๐ง๐  ๐Ÿ๐ซ๐จ๐ฆ ๐ญ๐ก๐ž ๐ข๐ง๐œ๐ซ๐ž๐๐ข๐›๐ฅ๐ž ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐š๐ญ ๐ญ๐ก๐ž ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ฏ๐ž๐ซ๐ฌ๐ž ๐ฌ๐ฎ๐ฆ๐ฆ๐ข๐ญ ๐ข๐ง ๐Œ๐š๐ฎ๐ซ๐ข๐ญ๐ข๐ฎ๐ฌ!๐ŸŒŸ Check out our booth setup and catc...
Yesterday, A&D Forensics  in partnership with Africa Stablecoin Consortium  trained 20 INTERPOL Nigeria officers at the ...
Yesterday, A&D Forensics  in partnership with Africa Stablecoin Consortium  trained 20 INTERPOL Nigeria officers at the ...
Certified Cryptocurrency Compliance Training at A&D Forensics Nigerian
We've come to the end of a 5-Day Intensive Cybersecurity Training at CBN International Training Institute
Day 2 of our Cybersecurity Training at CBN Training Institute  commenced with a swift recap of Day 1's activities.This s...
Our #3CS participants have just completed the fifth and final module of this comprehensive program and are now ready to ...
๐Ÿ‘‹ Hey Cryptocurrency enthusiasts! Are you ready for a fun and informative learning experience? Our Certified Cryptocurre...
Our Senior Partner, Adedeji Owonibi  was appreciated, "For Establishing The First Cryptocurrency Forensic Lab In Nigeria...
It's a Dazzling Tuesday and we thought to remind you that we are always here to serve you betterโœ๏ธMake your choices and ...
Last Cohort, we had participants from various cryptocurrency exchanges and VASPs. According to Victor Tugwa CCCS, variou...

Address

No 3 Rabat Street, Off Herbert Macaulay Way, Wuse Zone 6
Abuja
900286

Opening Hours

Monday 09:00 - 17:00
Tuesday 09:00 - 17:00
Wednesday 09:00 - 17:00
Thursday 09:00 - 17:00
Friday 09:00 - 17:00

Other Consulting Agencies in Abuja (show all)
12th September is Our Birthday (Mr. Damasus E. I. Akobi & J.Cy.Mike Esq) 12th September is Our Birthday (Mr. Damasus E. I. Akobi & J.Cy.Mike Esq)
Abuja, 552111

LORD SHOW US THE WAY Kindly Pray for us as we mark our Birthday Anniversary this September

Eden Solutions & Resources Eden Solutions & Resources
Plot 2048, ICAN Building, Michael Okpara Street, Wuse Zone 5
Abuja, 234

Eden Solutions & Resources Ltd is a HR company in Abuja, Nigeria. It was set up in 2002 and offers s

Foss architectural & construction limited Foss architectural & construction limited
Abuja

We design, construct, and develop all kind of buildings. Also, we do interior decoration as in wood

eConsult business eConsult business
Abuja, 900211

eConsult business provides wide range of services including goal setting/implementation, coaching, p

JMK Consults LTD JMK Consults LTD
Shop 11, Car Park, Opposite VIO HQ, Close To The Federal Ministry Of Works & Housing Mabushi
Abuja

We help to facilitate Nigerian & international driver license, vehicle particulars/registration & mor

Beaming Light Consultings Beaming Light Consultings
Abuja

Beaming Light Consultings is an educational and management consultancy firm. Some of the services we

Crowd 1 Investment Crowd 1 Investment
T. O. S. Benson Crescent, Mabushi
Abuja, 900211

Don't neglect this opportunity forget the ugly past experience in networking business try crowd 1 th

Genuine Visa Consult Gvc Genuine Visa Consult Gvc
App Resettlement
Abuja, 234

We help in processing of visa and booking of flight

Dynamic Multicrown Global Ventures Dynamic Multicrown Global Ventures
No 7 Ilesanmi Street, Kwankwashe Suleja
Abuja, 910101

For any of your project and events, contact us for your dealings

Gordon Barrett Limited Gordon Barrett Limited
49 Parakou Street Wuse 2
Abuja

Strategy Development & Ex*****on Human Capital Development Business Process Re-engineering International Development Advisory

SUNNY Plumber SUNNY Plumber
Along Dunamis Road Nyanya Abuja
Abuja

sunny plumber is well know as a professional in plumber call sunny for your plumbing I promise you will not regret.

Ayolark Consult Ayolark Consult
Bwari, Federal Capital Territory
Abuja

We offer Consultation services on any issues you as a human being might be confronted with, we also market your products to suitable/potential purchasers. Ayolark Consult is a plac...