forensics in cybercrime cases - varni na internetu · • nist's computer security incident...

25
Forensics in cybercrime cases What happens to organizations that have to deal with a cyber-attack?

Upload: others

Post on 22-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Forensics in cybercrime casesWhat happens to organizations that

have to deal with a cyber-attack?

Page 2: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

About me

• Christian Prickaerts• [email protected]

• My day job• In charge of DFIR @Fox-IT

• Providing expert witness testimony

• SANS Institute instructor

Page 3: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response
Page 4: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Digital forensics 15 years ago

Page 5: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Digital forensics anno 2014

Page 6: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Role of digital forensics in IR?

Page 7: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response
Page 8: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Black Swan

• High-impact

• Hard-to-predict

• Non-computable

• Psychological biases blinds

Page 9: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response
Page 10: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response
Page 11: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Incident Response

• NIST's Computer Security Incident Handling Guide (SP800-61)

Guide to Integrating Forensic Techniques into Incident Response (SP800-86)

Page 12: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Incident Response lifecycle

Page 13: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response
Page 14: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Digital forensics – the challenge

• Digital information is everywhere• Computer

• Mobile devices

• Network

• External storage devices

• Backup tapes

• The cloud

• Increasingly more data in many different formats

• Added challenges: duplicates, malformed data

Page 15: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Security Intelligence

Analysis of successful intrusion

Analysis and synthesis of unsuccessful intrusionMichael Cloppert, 2009

Page 16: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Use the force

• Imaging all and always is not time efficient

• Provide intelligence quickly• Perform live forensic analysis

• Using forensically sound tools

• Combine• Network data

• File system data

• Operating system data

• Application data

Page 17: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Manage your logs

Page 18: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Data in your network

• Log files of network systems:• Firewall logs

• IDS logs

• VPN logs

• Proxy logs

• Active directory logs

• DHCP logs

• Synchronize systems with central NTP system

Page 19: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

A cunning plan.....

19

“Delete the logs and use a program likeCCleaner to destroy possible relevant evidence

to frustrate the forensic investigation”

Page 20: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Modus Operandi

Page 21: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Digital forensics in court

Page 22: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

European Commission

• Upcoming (new) data-protection legislation

• Data breach notification: The drafted rules are similar to rules in relation to providers of public (electronic) communications services

• To be able to notify, one must know

Page 23: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

First fully documented digital forensic investigation

• The Cuckoo's Egg

• Written by Clifford Stoll

• The story:• Hacker active in defense networks

• Unix sysadmin investigates the incident

• Pioneer in digital forensics

Page 24: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Educate your staff

“If you think education is expensive, try ignorance.”

Derek Bok, former president of Harvard

“It does not matter how slowly you go as long as you do not stop.”

Confucius

Page 25: Forensics in cybercrime cases - Varni na internetu · • NIST's Computer Security Incident Handling Guide (SP800-61) Guide to Integrating Forensic Techniques into Incident Response

Christian [email protected]