80 workstations. 1,600+ Viber accounts.
One investigation team. Zero room for error.
When a joint operation dismantled a Cambodia-based scam syndicate, investigators uncovered the operation’s engine room: 80+ workstations running over 1,600 Viber accounts — each one a tool for cross-border fraud. What threatened to bury the case entirely was not the suspects, but the sheer scale of digital evidence left behind.
This is how MD-PCM turned an operationally unfeasible challenge into actionable intelligence.
The Growing Bottleneck in Transnational Cybercrime Investigations
Modern organized crime syndicates operate across jurisdictions by design. Fragmented infrastructure, encrypted messaging, and multiple identities per device are no longer edge cases — they are standard operating procedure for today’s threat actors.
For law enforcement agencies (LEAs), this creates a dual burden:
• Scale: Dozens to hundreds of seized devices requiring simultaneous triage
• Complexity: Encrypted messenger applications with multiple accounts per workstation, each requiring individual credential extraction
In international operations, time is evidence. Delays don’t just slow investigations — they allow syndicates to destroy remaining assets, warn co-conspirators, and render leads obsolete.
Case Highlight: The Viber Account Labyrinth
During a high-stakes international criminal investigation, investigators seized 80+ workstations from a Cambodia-based scam syndicate — each terminal running upwards of 20 distinct Viber accounts, totaling over 1,600 communication channels weaponized to orchestrate fraud across borders.
Manual processing was operationally unfeasible. The investigation demanded a solution that could deliver rapid triage without compromising forensic soundness — because in international cases, evidentiary admissibility is non-negotiable.
Strategic Deployment: MD-PCM & MD-RED
The investigative team deployed MD-PCM (PC Messenger Extraction Tool), delivering three critical capabilities that transformed the trajectory of the case.
1.Forensic Soundness via Portable Execution
MD-PCM runs directly from an external SSD — no installation required. By minimizing changes to the host system’s registry and file system, it preserves the integrity of the source device from the first interaction. In high-profile international cases where chain of custody is scrutinized at every stage, this isn’t a convenience feature. It’s a requirement.
*Supported environments: Windows, macOS and forensic images (E01, DD, and more)
2.Auto-Detection of Multi-Accounts and Multi-Messengers
Manually searching for numerous accounts across different messengers on a single PC is a primary cause of investigative delay. MD-PCM automatically detects installed messenger applications, user IDs, and credentials. This automation slashes extraction time and eliminates the risk of human error in identifying hidden profiles.
3.Precision Triage:EliminatingNon-Probative Data
In high-volume cases, indiscriminate data collection is its own liability. MD-PCM targets specific messenger artifacts and decryption, filtering out non-probative data before it ever reaches the analyst. The resulting curated dataset was seamlessly ingested into MD-RED, enabling investigators to decrypt communications, visualize network hierarchies, and map the syndicate’s operational structure — in hours, not weeks.
Outcome: From Digital Mountain to Dismantled Syndicate
By compressing the time-to-evidence from weeks to hours, MD-PCM allowed the task force to act while intelligence was still operationally relevant. The case stands as a direct example of how purpose-built forensic tooling — not general-purpose solutions — determines outcomes in large-scale international crime investigation.
Is Your Team Facing a High-Volume Evidence Challenge?
Whether you’re managing a single complex case or coordinating across multiple jurisdictions, the MD-Series is engineered to ensure that investigative complexity never becomes an obstruction to justice.
Explore MD-PCM