Automated Analysis of “abuse” mailbox for employees with the help of Malzoo

By Niels Heijmans

For most companies, e-mail is still the main form of communication, both internally and with customers. Unfortunately, e-mail is also used heavily by cyber criminals in the form
of spam, phishing, spear-phishing, fraud or to deliver malicious software. Employees receive these kinds of messages on a daily basis, even though strict security measures are
implemented. Sometimes an employee will fall for the scam but often they will know when it is a false e-mail, especially after good awareness programs. Instead of letting
them delete the e-mail, let them share it with you to learn and see what is coming through your security measures or what employees see as “fishy”. But what should you do with
the e-mails that are forwarded to this special “abuse” mailbox? Malzoo can be used to analyze this mailbox by picking up the e-mails, parsing them and sharing the results with
the CERT team. By using the collected data, you can find new spam runs, update spam filters, receive new malware and learn in what parts of the company awareness is highest
(and lowest). This paper explains the benefits and drawbacks of letting employees have a central point to report suspicious e-mail and how Malzoo can be used to automate the analysis.

» Read more

Beats & Bytes: Striking the Right Chord in Digital Forensics (OR: Fiddling with Your Evidence)

by Ryan D. Pittman, Cindy Murphy, and Matt Linton

This paper will present results from a recent survey of DF/IR professionals and seek to provide relevant observations (together with published psychological, sociological, and neurological research) to discuss the similarities and intersections of DF/IR and music, as well as identify potential correlations between being a successful DF/IR professional and playing music. It will also discuss numerous challenges facing DF/IR professionals today and how learning to play and enjoy music can help DF/IR personnel both overcome some of those challenges and be more effective in their chosen field.
» Read more

Forensicating Docker with ELK

by Stefan Winkel

Docker has made an immense impact on how software is developed and deployed in today’s information technology environments. The quick and broad adoption of Docker as part of the DevOps movement has not come without cost. The introduction of vulnerabilities in the development cycle has increased many times. While efforts like Docker Notary and Security Testing as a Service are trying to catch up and mitigate some of these risks, Docker Container Escapes through Linux kernel exploits like the recent widespread Dirty COW privilege escalation exploit in late 2016, can be disastrous in a cloud and other production environments. Organizations find themselves more in need of forensicating Docker setups as part of incident investigations. Centralized event logging of Docker containers is becoming crucial in successful incident response. This paper explores how to use the Elastic stack (Elasticsearch, Logstash, and Kibana) as part of incident investigations of Docker images. It will describe the effectiveness of ELK as result of a forensic investigation of a Docker Container Escape through the use of Dirty COW.
» Read more

Best Practices in Mobile Phone Investigations

The field of mobile phone investigation has grown exponentially in recent years. The number of cell phones investigated each year has increased nearly tenfold over the past decade. Courtrooms are relying more on the information inside a cell phone as vital evidence in cases of all types.

Despite that, the practice of mobile phone forensics is still in its relative infancy. Many digital investigators are new to the field and are in search of a simple book that could be titled Phone Forensics for Dummies.

Unfortunately, that book is not available yet—so investigators need to look elsewhere for information on how to best tackle cell phone analysis. This article can help—although by no means should it serve as an academic guide. It can, however, be used as a first step to help an investigator gain a basic understanding in the area.
» Read more

1 2 3 4