My phone rings whenever a client is hacked, suffers a data breach, or is a victim of identity theft via digital means. My job as chief information security officer is to look at all the digital evidence.
When possible, I reconstruct the cyber attack. Itโs C.S.I. work. By reconstructing the attack, often I can tell where it came from, how it unfolded andโmost importantlyโwho did it. Itโs a way of finding and preserving digital evidence. Thereโs a reason itโs called forensics.
Digital forensics can be divided into four categories. If you, as a consumer, know what these are and how to handle them in the event of an attack, you can help me do my job and restore your companyโs daily operations.
The Four Categories of Digital Forensics
1. Static media. This is your computer or smartphoneโs hard drive. Itโs the storage media thatโs fixed, unmoving, and often the first thing we look at in an investigation.
2. Volatile information. This is a little more complex. Itโs the information in your systemโs memory, or ram, and the computer processes, or CPU. This can tell us what processes were running at the time of the attack.
3. Network forensics. This is a top down traffic analysis. Was your computer on a network? Or on the Internet? What types of calls were being made into your machine? Was it making outgoing calls?
4. Binary and malware analysis. If and when we find malicious software on your computer, this is where and how we deconstruct it. We look for when the program was made, and if the author left any traces that could aid identification.
Hereโs What to Do
These are the four areas you want to try to preserve if your system is compromised. How you react depends on whatโs happening. If you notice a digital crime in progress, it might be tempting to shut the machine down to stop it, but this could erase volatile information. If you have reason to believe the malware or hacker will spend some time inside your machineโwithout causing devastating personal damageโkeep the system running and contact a professional.
Itโs safe to shut down the computer before you seek help if the hack happened months ago and files were affected. It may also prevent a follow-up attack.
If your computer is on a network, ask the administrator or owner if network traffic is recorded. Many businesses and government networks have banks of static drives that record network traffic (network forensics) in the event of an attack. This is a silver bullet in a forensic investigation because you can literally โwatchโ the hack unfold as if it were recorded on surveillance camera.
Most importantly, if youโre hacked, breached or the victim of digital identity theft, youโll need an information security specialist and digital forensic specialist to get to the bottom of the case. Knowing how cybercrime is investigated, I hope, will make you a more informed victim, which ultimately can help catch the bad guy.
Image: James Halliday, via Flickr
This article was originally published on Identity Theft 911 blog.
You Might Also Like
September 13, 2021
Uncategorized
August 4, 2021
Uncategorized
January 28, 2021
Uncategorized