Cyber Forensics Notes
Cyber Forensics Notes
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic devices)
while following proper investigation rules to nab the culprit by presenting the evidence to the court.
Cyber forensics is also known as computer forensics. The main aim of cyber forensics is to
maintain the thread of evidence and documentation to find out who did the crime digitally. Cyber
forensics can do the following:
It can recover deleted files, chat logs, emails, etc
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
Technology combined with forensics paves the way for quicker investigations and accurate results.
Below are the points depicting the importance of cyber forensics:
Cyber forensics helps in collecting important digital evidence to trace the criminal.
Electronic equipment stores massive amounts of data that a normal person fails to see. For
example: in a smart house, for every word we speak, actions performed by smart devices,
collect huge data which is crucial in cyber forensics.
It is also helpful for innocent people to prove their innocence via the evidence collected online.
It is not only used to solve digital crimes but also used to solve real-world crimes like theft
cases, murder, etc.
Businesses are equally benefitted from cyber forensics in tracking system breaches and finding
the attackers.
Cyber forensics is a field that follows certain procedures to find the evidence to reach conclusions
after proper investigation of matters. The procedures that cyber forensic experts follow are:
Identification: The first step of cyber forensics experts are to identify what evidence is present,
where it is stored, and in which format it is stored.
Preservation: After identifying the data the next step is to safely preserve the data and not
allow other people to use that device so that no one can tamper data.
Analysis: After getting the data, the next step is to analyze the data or system. Here the expert
recovers the deleted files and verifies the recovered data and finds the evidence that the
criminal tried to erase by deleting secret files. This process might take several iterations to
reach the final conclusion.
Documentation: Now after analyzing data a record is created. This record contains all the
recovered and available(not deleted) data which helps in recreating the crime scene and
reviewing it.
Presentation: This is the final step in which the analyzed data is presented in front of the court
to solve cases.
There are multiple types of computer forensics depending on the field in which digital investigation
is needed. The fields are:
Network forensics: This involves monitoring and analyzing the network traffic to and from the
criminal’s network. The tools used here are network intrusion detection systems and other
automated tools.
Email forensics: In this type of forensics, the experts check the email of the criminal and
recover deleted email threads to extract out crucial information related to the case.
Malware forensics: This branch of forensics involves hacking related crimes. Here, the
forensics expert examines the malware, trojans to identify the hacker involved behind this.
Memory forensics: This branch of forensics deals with collecting data from the memory(like
cache, RAM, etc.) in raw and then retrieve information from that data.
Mobile Phone forensics: This branch of forensics generally deals with mobile phones. They
examine and analyze data from the mobile phone.
Database forensics: This branch of forensics examines and analyzes the data from databases
and their related metadata.
Disk forensics: This branch of forensics extracts data from storage media by searching
modified, active, or deleted files.
Cyber forensic investigators use various techniques and tools to examine the data and some of the
commonly used techniques are:
Reverse steganography: Steganography is a method of hiding important data inside the digital
file, image, etc. So, cyber forensic experts do reverse steganography to analyze the data and
find a relation with the case.
Stochastic forensics: In Stochastic forensics, the experts analyze and reconstruct digital
activity without using digital artifacts. Here, artifacts mean unintended alterations of data that
occur from digital processes.
Cross-drive analysis: In this process, the information found on multiple computer drives is
correlated and cross-references to analyze and preserve information that is relevant to the
investigation.
Live analysis: In this technique, the computer of criminals is analyzed from within the OS in
running mode. It aims at the volatile data of RAM to get some valuable information.
Deleted file recovery: This includes searching for memory to find fragments of a partially
deleted file in order to recover it for evidence purposes.
Advantages
Digital evidence is information stored or transmitted in binary form that may be relied on in court. It
can be found on a computer hard drive, a mobile phone, among other place s. Digital evidence is
commonly associated with electronic crime, or e-crime, such as child pornography or credit card
fraud. However, digital evidence is now used to prosecute all types of crimes, not just e-crime. For
example, suspects' e-mail or mobile phone files might contain critical evidence regarding their intent,
their whereabouts at the time of a crime and their relationship with other suspects.
In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law enforcement
agencies are incorporating the collection and analysis of digital evidence, also known as computer
forensics, into their infrastructure. Law enforcement agencies are challenged by the need to train
officers to collect digital evidence and keep up with rapidly evolving technologies such as computer
operating systems.
Internet fraud involves using online services and software with access to the internet to defraud or
take advantage of victims. The term "internet fraud" generally covers cybercrime activity that takes
place over the internet or on email, including crimes like identity theft, phishing, and other hacking
activities designed to scam people out of money.
Internet scams that target victims through online services account for millions of dollars worth of
fraudulent activity every year. And the figures continue to increase as internet usage expands and
cyber-criminal techniques become more sophisticated.
Internet fraud offenses are prosecuted under state and federal law
Cyber criminals use a variety of attack vectors and strategies to commit internet fraud. This includes
malicious software, email and instant messaging services to spread malware, spoofed websites that
steal user data, and elaborate, wide-reaching phishing scams.
Internet fraud can be broken down into several key types of attacks, including:
1. Phishing and spoofing: The use of email and online messaging services to dupe victims into sharing
personal data, login credentials, and financial details.
2. Data breach: Stealing confidential, protected, or sensitive data from a secure location and moving it
into an untrusted environment. This includes data being stolen from users and organizations.
3. Denial of service (DoS): Interrupting access of traffic to an online service, system, or network to
cause malicious intent.
4. Malware: The use of malicious software to damage or disable users’ devices or steal personal and
sensitive data.
5. Ransomware: A type of malware that prevents users from accessing critical data then demanding
payment in the promise of restoring access. Ransomware is typically delivered via phishing attacks.
6. Business email compromise (BEC): A sophisticated form of attack targeting businesses that
frequently make wire payments. It compromises legitimate email accounts through social engineering
techniques to submit unauthorized payments.
To avoid hackers’ internet fraud attempts, users need to understand common examples of internet
fraud and tactics.
The attack aims to encourage people to click on a link that leads to a malicious or spoofed website
designed to look like a legitimate website, or open an attachment that contains malicious content.
The hacker first compromises a legitimate website or creates a fake website. They then acquire a list
of email addresses to target and distribute an email message that aims to dupe people into clicking on
a link to that website. When a victim clicks the link, they are taken to the spoofed website, which will
either request a username and password or automatically download malware onto their device, which
will steal data and login credential information. The hacker can use this data to access the user’s
online accounts, steal more data like credit card details, access corporate networks attached to the
device, or commit wider identity fraud.
Many internet fraud attacks focus on popular events to scam the people that celebrate them. This
includes birthdays, Christmas, and Easter, which are commonly marked by sharing greeting cards
with friends and family members via email. Hackers typically exploit this by installing malicious
software within an email greeting card, which downloads and installs onto the recipient’s device when
they open the greeting card.
Credit card fraud typically occurs when hackers fraudulently acquire people's credit or debit card
details in an attempt to steal money or make purchases.
To obtain these details, internet fraudsters often use too-good-to-be-true credit card or bank loan deals
to lure victims
Online Dating Scams
Scammers typically create fake profiles to interact with users, develop a relationship, slowly build
their trust, create a phony story, and ask the user for financial help.
Lottery fee fraudsters typically craft emails to look and sound believable, which still results in many
people falling for the scam. The scam targets people's dreams of winning massive amounts of money,
even though they may have never purchased a lottery ticket.
The scam uses the premise of a wealthy Nigerian family or individual who wants to share their wealth
in return for assistance in accessing their inheritance. It uses phishing tactics to send emails that
outline an emotional backstory, then lures victims into a promise of significant financial reward. The
scam typically begins by asking for a small fee to help with legal processes and paperwork with the
promise of a large sum of money further down the line.
These challenges are categorized into five broad areas: hardware challenges, software challenges,
cloud forensic challenges, legal challenges and human challenges.
HARDWARE CHALLENGES - Studies suggested that some criminal suspects change the hard disk
within their devices before the Cyber Forensic expert can gain access to the device. In such cases, the
suspects use the write blockers to shift information between the two hard disks. The main effect is that
a forensic examination of the new hard disk, may not display some of the relevant evidence. On the
other hand, the evidence gathered from the new hard disk will lack consistency, and may not be
apparent. Further, the evidence gathered from a device that was reset, may accentuate the problem
since during the reset process, a small portion of the backup information is likely to have been
reinstalled. For example, different mobile devices have hard disks that have enmeshed algorithm that
are responsible for erasing the data automatically. Since the technology for collecting information
from unused devices or devices where information was deleted by a user is still under development,
there is likely to be some delays in obtaining such information.
SOFTWARE CHALLENGES - The current operating systems have been log enabled, and now
requires a Cyber Forensic expert to gather background information on the device, which includes the
information on accessibility of the application, usage of the application, and the level of information
provided by the specific user of the application. Even though the new development appears like a
progress for the different devices, the development requires some time for it to mature. Several
challenges have been reported on the application accessibility since the application and the operating
system are defined differently . For example, any alteration made on the file content may not be
tracked until it is compared with subsequent/previous file versions or, if it is compared with the
modified version of the time stamp. In case the Cyber Forensic expert suspects some manipulation on
the document, it would be a challenge to determine the extent of manipulation .
Further, some forms of applications and log information that are collected by the application or the
operating system, could be useful as evidence in certain cases. Despite the usefulness of the
application, the awareness of its use is still at an infant stage making it difficult for the Cyber Forensic
experts to ensure the effective use of the application. The high number of mobile messaging
applications available across the globe uses a software that automatically erase the information that is
shared. The main challenge here is that it will be complex for a Cyber Forensic expert to gather such
information that was deleted. Another challenge is the encryption in different mobile devices with
intention of having the information protected especially during the process of gathering data. Certain
mobile chats allow a secure connection between the sender and the receiver with no option to retrieve
the message after a set time period. Other sessions are simply saved as text messages in the phone
storage allowing anyone with the mobile phone passcode to access all stored messages. The
decryption of devices may be a challenge to some investigations where the storage or device itself is
encrypted. Not handing over mobile device PIN and passwords could lead to legal consequences in
certain countries.
CLOUD FORENSIC CHALLENGES - The data in cloud computing devices, maybe able to be
accessed everywhere hence posing another challenge to the investigators. It is a challenge for the
investigator to locate the data in a way that ensures the privacy rights of the users. The investigators
require the knowledge on anti-forensic tools, practices, and tools that help ensure that the forensic
analysis is done accordingly. Cloud-based applications also enable users to ensure that data is
accessed from various devices. For example, if one of the two devices of a single user is compromised
and both devices lead to some changes in the application, it would be difficult for the Cyber Forensic
expert to identify the real source of the change. High risks may compromise credentials and theft of
the identity in an environment that is cloud-based and lead to changes that are unknown such as the
evidence remaining unknown. In most cases, it would be difficult to examine severs of the mail and
identify the evidence of the deleted communication.
LEGAL CHALLENGES - Cyber laws and regulations in different jurisdiction vary and many do not
take into account, the complexity in collecting forensic evidence. Accessibility to private information
is likely to be considered as a violation of user privacy. On the other hand, the era of companies
giving some provision to their employees to use their individual devices in accessing the official
communication is likely to contribute to several challenges involved in data gathering. Accessing the
email of a user, for instance, using webmail and a smart mobile device together with downloading the
involved attachments is an example of theft of personal data.
HUMAN CHALLENGES - At an early stage of the investigation, the Cyber Forensic expert is
required to get involved in gathering evidence. Early engagement in the investigation process helps
the Cyber Forensic expert to be in a position to restore all the content without causing damage to the
integrity .
After opening a given case, the items that would be seized include the digital devices, software, and
other media equipment’s so as to run the investigation. In the retrieval process, the items considered
essential will be gathered so as to give the analyst everything that would be required for the
testimony. Another human-related challenge faced by Cyber Forensics is spoliation .. Spoliation
occurs when the person handling evidence fails to preserve, alters evidence, or destroys evidence that
could be useful in pending ligation .Spoliation may be caused by negligent on the part of the party
handling the litigation or handling evidence and intentional destroying evidence by the handler.
Destroyed Evidence
In a criminal or cyber-criminal case, the attempts to destroy the evidence are very common. Such
attempts can be more or less successful depending upon the following conditions:
Deleted Files
Deleting files is one of the easiest, convenient, and foremost way to destroy the evidence. The
principle of file recovery of deleted files is based on the fact that Windows does not wipe the
contents of the file when it’s being deleted. Instead, a file system record storing the exact location
of the deleted file on the disk is being marked as “deleted” and the disk space previously occupied
by the deleted file is then labeled as available – but not overwritten with zeroes or other data.
The deleted file can be retrieved by analyzing the contents of the recycle bin as they are
temporarily stored there before being erased.
If the deleted files have no trace in the recycle bin like in case of the “Shift+Delete” command,
then, in that case, you can use commercial recovery tools to recover the deleted evidence.
Looking for characteristic signatures of known file types by analyzing the file system and/or
scanning the entire hard drive, one can successfully recover :
Files that were deleted by the user.
Temporary copies of Office documents (including old versions and revisions of
such documents).
Temporary files saved by many applications.
Renamed files.
Information stored in deleted files can be supplemented with data collected from other sources.
SSD Drives
The culprit in SSD is TRIM Command. According to a survey, TRIM enables SSD completely
wiped all the deleted information in less than 3 minutes. This means that the TRIM command
effectively zeros all the information as soon as it is marked as deleted by the operating system.
Traditional Methods are not useful when we try to recover deleted data from the SSD .This means
the traditional methods can be used for data recovery in SSD only when the TRIM command is not
issued or at least one of the components does not support TRIM. The components include:
Version of Operating System
Communication Interface
File System
Data Carving
Carving means bit-precise and sequential examination of the entire content of the hard drive. The
concept of Data Carving is completely different from File Recovery. Carving allows:
Identifying particular signatures or patterns that may give a clue that some interesting data can
be stored in a particular spot on the disk.
Locating various artifacts that would not be available otherwise.
Data Carving has the following features when we are dealing with the text content:
Text information is easiest to recover.
Blocks containing text data are filled exclusively with numeric values belonging to a shallow
range that represents letters, numbers, and symbols.
When carving for text data, investigators have to take various languages and text encodings into
accounts. For example, the Turkish character set differs from Latin, and neither has anything in
common with Arabic, Chinese or Korean writing.
Different encodings must be taken into account when looking for texts in each supported
language.
By analyzing the information read from the disk in terms of a specific language and a specific
encoding, one can typically detect text information.
In the case of Binary data:
Binary data is much random.
It is easy to detect the beginning and end of each text block by counting the number of
characters that do not belong to a given language/encoding combination.
Once a set threshold is met, it is assumed that the algorithm has reached the end of a given text
block.
Limitations of Data Carving –
The performance requirements for computers used in digital forensics are high, requiring larger
capacity hard drives, faster central processing units (CPUs), bigger memory, etc. Hardware Hardware
tools are designed primarily for storage device investigations, and they aim to keep suspect devices
unaltered to preserve the integrity of evidence.
A forensic disk controller or a hardware write blocker is a read-only device that allows the user to
read the data in a suspect device without the risk of modifying or erasing the content. Conversely, a
disk write-protector prevents the content in a storage device from being modified or erased. A hard-
drive duplicator is an imaging device that copies all files on a suspect hard drive onto a clean drive; it
can also duplicate data in flash drives or secured digital (SD) cards.
A password recovery device employs algorithms, such as brute-force or dictionary attacks, to attempt
to crack password-protected storage devices.
Windows Registry records when, where, and how a file is created, renamed, viewed, moved, or
deleted, and some applications can perform registry analysis to collect and analyze these traces.
For mobile device forensics, while the focus is primarily on mobile phones, most digital devices with
internal memory and communication ability, such as GPS devices, smartwatches, or tablets, can be
investigated with these applications. The applications focus on the suspect’s activities on a mobile
device.
#1) ProDiscover Forensic is a computer security app that allows you to locate all the data on a
computer disk. It can protect evidence and create quality reports for the use of legal procedures. This
tool allows you to extract EXIF(Exchangeable Image File Format) information from JPEG files.
#2)Sleuth Kit (+Autopsy) is a Windows based utility tool that makes forensic analysis of computer
systems easier. This tool allows you to examine your hard drive and smartphone.
#3)CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a
graphical interface. This tool can be integrated into existing software tools as a module. It
automatically extracts a timeline from RAM.
#4) Acrobat PDF to Excel Convertor transfers PDF data and content right into an Excel spreadsheet.
This converted file proves helpful for tracking down cybercriminals from anywhere in the world. This
computer forensic tool supports both partial and batch conversion.
#5) Google Takeout Convertor converts archived email messages from Google Takeout along with all
attachments. This software helps investigate officers to extract, process, and interpret the factual
evidence.
#6) PALADIN is Ubuntu based tool that enables you to simplify a range of forensic tasks. This
Digital forensics software provides more than 100 useful tools for investigating any malicious
material. This tool helps you to simplify your forensic task quickly and effectively.
#7) Encase is an application that helps you to recover evidence from hard drives. It allows you to
conduct an in-depth analysis of files to collect proof like documents, pictures, etc.
#8) SIFT Workstation is a computer forensics distribution based on Ubuntu. It is one of the best
computer forensic tools that provides a digital forensic and incident response examination facility.
#9) FTK Imager is a forensic toolkit i developed by AccessData that can be used to get evidence. It
can create copies of data without making changes to the original evidence. This tool allows you to
specify criteria, like file size,
#10) Magnet RAM capture records the memory of a suspected computer. It allows investigators to
recover and analyze valuable items which are found in memory.
Unit 2
Validation
Validation is important for laboratories so that they can be trusted to produce accurate results every
time.
A. Data generation- This primarily relates to attribution and providing assurance that an identified
identity did in fact generate the data. Attribution, if possible, must identify the system generating the
data, the application creating the data, the user running the application, when the data was created, etc.
The more parameters that can be validated the more certainty that can be associated with the validity
of the data itself and the more acceptable the data will be.
B. Data collection- After data is generated, a repository must collect the data. This will require
ensuring that the data is not modified on the way to the repository and providing validation of
temporal relationships. These needs for forensics would be insufficient in terms of security, which
would also require that the data could not be read and examined in transit. A related issue is ensuring
that the data actually makes it to the repository. The loss of data is especially problematic when
considering legal admissibility and forensic analysis.
C. Data storage- Once in place at the repository, the system must provide for deletion and
modification prevention and recovery. Insertion of elements is not a concern since the level of
validation provided for authentic elements ensures that inappropriately inserted elements can be
identified. Thus, these inserted elements will in essence provide additional evidence. This again
differs from typical security and privacy issues where viewing the data may be a primary concern,
which it is not with forensics.
D. System validation- System validation is associated with data generation and requires the unique
identification of systems, identification of system restarts, identification of changed system
configuration and attributes, and validation that messages were in fact generated by the designated
system. The goal is to be able to identify when a malicious system, application, or user may be
infiltrating the network. More specifically, it must be noted when a known system’s attributes
suddenly changes substantially. Sudden changes would indicate that the system is in fact different,
whether malicious or not. This would be identified in logs when the system first connects to the data
storage repository.
F. User validation- User validation attempts to provide validation of the users of a system as discussed
in relation to system validation. More specifically, it is important to verify the user that started the
application that is generating events and specified its parameters. Secondarily, it is important to know
other users active on the system to verify the integrity of the system as a whole.
G. Algorithm applicability- The goal of algorithm applicability is to validate that the chosen algorithm
has in fact been scientifically proven to generate correct results and to be appropriate for the given
application in digital forensics.
H. Algorithm implementation- Given that an algorithm itself has been validated, the implementation
must be similarly validated. Errors often occur in the transcription from a theoretical algorithm to an
implemented algorithm. For example, SSH uses a well established protocol for initiation of a
connection and for maintaining the security of that connection. This protocol is well validated.
However, there have been well-known bugs in the implementation of the SSH protocol that have
allowed it to be compromised.
The basis of digital forensics is being able to repeat processes and obtain quality evidence. If the
results are not accurate, then it is difficult to trust the laboratory and company. Digital forensic test
results need to be repeatable and reproducible to pass as electronic evidence, according to the
National Institute of Standards and Technology (NIST).
Repeatable evidence means there are always the same results when the same process is used with the
same test items, operator, and equipment inside the same laboratory. Reproducible evidence means
the same results are produced with the same methods on the same items but in a different facility with
different operators and equipment.
The Daubert Standard is a legal guide that can be used for software and tool validations. In the ruling
of Daubert v. Merrell Dow Pharmaceuticals Inc., there are five questions that influence the reliability
of a scientific method:
(1) Steganography is the way to provide the security when data is transferred in the network.
Steganography word came out from Greek, literally means covered writing . It is an art of hiding
information in the way to prevent the detection of hidden messages. In this way we hide the
information through some multimedia files. These multimedia files can be audio, image or video. The
purpose of Steganography is to covert communication to hide the confidential information from
unauthorized user or the third party. In this process if the feature is visible, the point of attack is
evident thus the goal here is always to give chances to the very existence of embedded data. The
security issues and top priority to an organization dealing with confidential data the method is used
for security purpose as the burning concern is the degree of security. The security system is
categorized into two parts . Information hiding and cryptography. Information hiding has two part
steganography and watermarking. Steganagraphy further divided into two parts are as:
1.1Technical Steganography- In this technique, we use invisible ink or microdots and other sizes
reduction methods. This is a scientific method to hide data .Technical Steganography is used in the
following technique:-
a) Video Steganography: In this technique, we can easily hide large data file in the video
Steganography. Video file is generally a collection of images and sounds. Any small but otherwise
noticeable distortion might go by unobserved by humans because of the continuous flow of
information.
b)Audio Steganography: In this technique, secret messages are embedding in digital sound. The secret
message is embedded by slightly altering the binary sequence of a sound file. Existing audio
Steganography software can embed messages in WAV, AU and even MP3 sound files.
c)Text Steganography: In text Steganography the message is hidden in the text and we use the
different method to hide the message in text by changing the last bit of the message. Sometime one
sentence in ten times and use blank space in alphabet terms is used.
d) Image Steganography: In this technique, hide information; straight message insertion may encode
every bit of information in the image. The messages may also be scattered randomly throughout the
images. A number of ways exist to hide information in digital media.
e) Protocol Steganography: In this technique, Steganography can be used in the layer of OSI network
model and cover channels protocols. Steganography is referred to the techniques of embedding
information within messages and network control protocol used in network transmission. The
information is adding in TCP/IP header and sends in the network.
1.2 Linguistic Steganography- This technique hides the message within the carrier in some non-
obvious ways. It is categorized Into two ways:-
a) Semagrams: Semagrams use some symbols and signs to hide the information .
b)Open Code: This hide a message within a legitimate carrier message in the ways that are not
obvious to an unsuspecting observer .
2. In Watermarking applications, the message contains information such as owner identification and
a digital time stamp, which is usually applied for copyright protection. This is categorized into two
parts .
2.1 Fragile watermark: Fragile watermark is watermark that is readily altered when the host image is
modified thorough a liner or non-liner transformation. It is used to the authentication of image. This is
used to verify the image.
2.2 Robust Watermarking: Robust watermarks are used in copy protection applications to carry copy
and no access control information to form correct order and get the digital water marking. A digital
watermark is called perceptible if its presence in the marked signal is noticeable.
3. Steganalysis is simply the detection of steganography by a third party. This is a relatively new
field, since the new technology behind steganography is just becoming popular. There are two main
types of steganalysis:
3.1)Visual analysis tries to reveal the presence of hidden information through inspection with the
naked eye or with the assistance of a computer, which can separate the image into bit planes for
further analysis.
3.2)Statistical analysis is more powerful and successful, because it reveals the smallest alterations in
an image‟s statistical behavior. There are several statistical tests which can be run on an image:
average bytes, variations of the bytes, skew, kurtosis, average deviation and differential values.
6. Echo Hiding- Hiding information in the noise of sound files is a good solution, but the information
may be erased by good compression algorithms. Information can be included by changing either the
strength or the length of the decay. Many recording software programs already include the ability to
add (or subtract) echoes from a recording. They can also change the character of the echo by
twiddling with strength of the echo and the speed at which it vanishes.
Mobile Forensics
Mobile forensics, a subtype of digital forensics, is concerned with retrieving data from an electronic
source. The recovery of evidence from mobile devices such as smartphones and tablets is the focus
of mobile forensics. Because individuals rely on mobile devices for so much of their data sending,
receiving, and searching, it is reasonable to assume that these devices hold a significant quantity of
evidence that investigators may utilize.
Mobile devices may store a wide range of information, including phone records and text messages,
as well as online search history and location data.
Uses of Mobile Forensics:
The military uses mobile devices to gather intelligence when planning military operations or
terrorist attacks. A corporation may use mobile evidence if it fears its intellectual property is being
stolen or an employee is committing fraud. Businesses have been known to track employees’
personal usage of business devices in order to uncover evidence of illegal activity. Law
enforcement, on the other hand, may be able to take advantage of mobile forensics by using
electronic discovery to gather evidence in cases ranging from identity theft to homicide.
Process of Mobile Device Forensics:
Seizure and Isolation: Mobile device seizures are followed by a slew of legal difficulties. The
two main risks linked with this step of the mobile forensic method are lock activation and
network / cellular connectivity.
Identification: The identification purpose is to retrieve information from the mobile device.
With the appropriate PIN, password, pattern, or biometrics, a locked screen may be opened.
Passcodes are protected, but fingerprints are not. Apps, photos, SMSs, and messengers may all
have comparable lock features. Encryption, on the other hand, provides security that is difficult
to defeat on software and/or hardware level.
Acquisition: Controlling data on mobile devices is difficult since the data itself is movable.
Once messages or data are transmitted from a smartphone, control is gone. Despite the fact that
various devices are capable of storing vast amounts of data, the data itself may be stored
elsewhere. For example, via the cloud. Users of mobile devices commonly utilize services such
as Apple’s iCloud and Microsoft’s One Drive, which exposes the possibility of data harvesting.
Examination and analysis: Because data on mobile devices is transportable, it’s tough to keep
track of it. When messages or data from a smartphone are moved, control is lost. Despite the
fact that numerous devices can hold vast amounts of data, the data itself may be stored
elsewhere.
Reporting: The document or paper trail that shows the seizure, custody, control, transfer,
analysis, and disposition of physical and electronic evidence is referred to as forensic reporting.
It is the process of verifying how any type of evidence was collected, tracked, and safeguarded.
The stages of a digital crime scene search and seizure broadly are:
A. Preparation/Planning stage.
B. Collection Stage.
C. Preservation/Transportation stage.
1. Preparation/Planning stage.
1.1. If the Investigating Officer (“IO”) has to seize a computer, he has to first examine whether the
computer is live or off-line. If the computer is online, it is important to make an image of the
computer and not perform any tasks on the computer. (An Image is an exact replicate of the machine,
on which further analysis can be done by the forensic teams without affecting the integrity of the
original). The Image is made with the help of forensic experts, after necessary write-blockers (devices
that ensure that nothing is written onto the drive/computer under seizure and it remains intact) Once
the image is procured, the original can be preserved, and the image can be presented in the Court (as
output of electronic evidence) after compliance of the requirements of Section 65-B of the Indian
Evidence Act (“IEA”).
1.2. Hash value generation is extremely important. Every machine/file would have a specific hash
value and specifying the hash value on the chain of custody document ensures that there is no
tampering with the machine along the way and the hash value for the image is the same even when the
same is produced in the court during the evidentiary hearings.
1.3. The certificate of Section 65-B IEA ought to made by the person producing the computer output
and incharge of the computer, and in a position to certify the integrity of the machine as well as the
output produced.
2.2. All the steps towards collection of electronic evidence should be documented clearly, step by
step.
3. Preservation/Transportation Stage
3.1. IO should note down the serial number of the machines clearly, not only on the Panchnama, but
also Chain of Custody document (that establishes integrity of the machine as it moves from the scene
of crime to the IO, to the Forensic Lab and then back to the Court) and the Seizure Memo.
3.2. IO should protect the device from external electric and magnetic fields. This can be achieved by
putting the devices in special bags. Also devices, wherever possible, should be put on airplane mode,
which not only conserves battery but protects the device from further tampering, or even remote
deletion.
Virtual crime
Virtual crime or in-game crime refers to a virtual criminal act that takes place in a massively
multiplayer online game or within the broader metaverse. The huge time and effort invested into such
games can lead online "crime" to spill over into real world crime, and even blur the distinctions
between the two. Some countries have introduced special police investigation units to cover such
"virtual crimes".
It is difficult to prove that there are real-life implications of virtual crime, so it is not widely accepted
as prosecutable.
To rectify this, the modern interpretation of the term "virtual" must be amended such that it carries the
traditional implication; "that is such in essence or effect, though not recognised as such in name or
according to strict definition." In this sense, it "would include those crimes that somehow evoke and
approach the effect and essence of real crime, but are not considered crimes."
In South Korea, where the number of computer game players is massive, some have reported the
emergence of gangs and mafia, where powerful players steal and demand that beginners give them
virtual money for their "protection".
Cyber Criminals and its types
Attackers are individuals or teams who attempt to exploit vulnerabilities for personal or financial
gain.
1. Hackers: The term hacker may refer to anyone with technical skills, however, it typically refers to
an individual who uses his or her skills to achieve unauthorized access to systems or networks so as to
commit crimes. The intent of the burglary determines the classification of those attackers as
(a). White Hat Hackers – These hackers utilize their programming aptitudes for a good and
lawful reason. These hackers may perform network penetration tests in an attempt to compromise
networks to discover network vulnerabilities. Security vulnerabilities are then reported to
developers to fix them.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly deceptive things
however not for individual addition or to cause harm. These hackers may disclose a vulnerability
to the affected organization after having compromised their network.
(c). Black Hat Hackers – These hackers are unethical criminals who violate network security for
personal gain. They misuse vulnerabilities to bargain PC frameworks.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web activity of their
victims to acquire personal data. This type of cyber crime is conducted through the use of social
networking platforms and malware, that are able to track an individual’s PC activity with little or no
detection.
4. Disgruntled Employees: Disgruntled employees become hackers with a particular motive and also
commit cyber crimes. It is hard to believe that dissatisfied employees can become such malicious
hackers. In the previous time, they had the only option of going on strike against employers. But with
the advancement of technology there is increased in work on computers and the automation of
processes, it is simple for disgruntled employees to do more damage to their employers and
organization by committing cyber crimes. The attacks by such employees brings the entire system
down.
Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of
life. This may include different type of activities either by software or hardware for threatening life
of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through the use of
cyberspace or computer resources.
Cyber Terrorism basically involves damaging large-scale computer networks to achieve a loss
of data and even loss of life. Hackers make use of computer viruses, spyware, malware,
ransomware, phishing, programming language scripts, and other malicious software to achieve
their purposes.
Also, these types of cyber-attacks which often lead to criminal offenses are referred to as Cyber
Terrorism.
Cyber Terrorism deals with creating damage to the people and their data using computer
networks intentionally in order to achieve their meaningful purpose.
Government Agencies like the FBI (Federal Bureau of Investigations) and the CIA (Central
Intelligence Agency) in the past have detected multiple cyber attacks and cyber crimes through
terrorist organizations.
According to the FBI, a Cyber Terrorism attack is defined as a cybercrime that may be used
intentionally to cause harm to people on large scale using computer programs and spyware.
A cyber terrorism attack is much more harmful than a normal cybercrime because to intentional
harm to the victims and it may not cause financial damage to cause fear in society.
In most cases, the criminals target the banking industry, military power, nuclear power plants,
air traffic control, and water control sectors for making a cyber terrorism attack for creating
fear, critical infrastructure failure, or for political advantage.
Working
Attacks:
Prevention:
Cybercrime or a computer-oriented crime is a crime that includes a computer and a network. The
computer may have been used in the execution of a crime or it may be the target. Cybercrime is the
use of a computer as a weapon for committing crimes such as committing fraud, identity theft, or
breaching privacy.
Cybercrime encloses a wide range of activities, but these can generally be divided into two
categories:
1. Crimes that aim at computer networks or devices. These types of crimes involve different
threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types of crimes
include cyber stalking, financial fraud or identity theft.
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or
threatened with repeated denial of service or other attacks by malicious hackers. These hackers
demand huge money in return for assurance to stop the attacks and to offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online
control systems and networks. It involves both offensive and defensive operations concerning to
the threat of cyber attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include
hiding of information or providing incorrect information for the purpose of deceiving victims
for money or property. Internet fraud is not considered a single, distinctive crime but covers a
range of illegal and illicit actions that are committed in cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. In this case, these stalkers know their victims and instead of offline
stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having
the desired effect, they begin offline stalking along with cyber stalking to make the victims’
lives more miserable.
5. No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh punishment in
some cases like when somebody commits cyber terrorism.
7. Software should be updated – Operating system should be updated regularly when it comes to
internet security. This can become a potential threat when cybercriminals exploit flaws in the
system.
Criminal justice includes all those systems, functions and government institutions which work to
maintain social control prevent and reduce crime and punish and rehabilitate those who violate the
law, also investigation and punishment of the accused of crime. Protection has been provided against
the misuse of Criminal Justice System. The necessary documents are presented in the witness court so
that he gets justice and the offender who commits the crime is punished and sent to jail or correctional
home and it is tried not to commit any such crime in future. All the corrective work is done; the
purpose of justice is to bring someone on the right path. The process of giving punishment according
to all these related institutions is called criminal justice system. Criminal justice is the delivery of
justice to those who have committed crimes. Goals include the rehabilitation of offenders, preventing
other crimes, and moral support for victims.
THE CRIMINAL JUSTICE SYSTEM CONSISTS OF THREE MAIN PARTS:
1. Law enforcement agencies, usually the police.
2. Courts and accompanying prosecution and defence lawyers.
3. Agencies for detaining and supervising offenders, such as prisons and probation agencies.
In the criminal justice system, these distinct agencies operate together as the principal means of
maintaining the rule of law within society.
RELATED TO CRIMINAL JUSTICE SYSTEM CYBER-CRIME
In any crime, the entire process from the victim to the criminal to the corrective, punitive work in the
prison comes under the Criminal Justice System that is in getting justice to the victim. On the basis of
coordination and best work morality is reached. A superior justice is reached and the criminal who has
committed the crime gets punishment in relation to his crime, by that punishment he brings necessary
improvement in his life.
According to the current cyber-crime the change in the criminal justice system was done only partly
which is not the change that is necessary. As done, there are three main parts of the criminal justice
system, first police investigation agency, second court system, third prisoner system, justice is
achieved only through these, when there are shortcomings in these mediums, then how to get
complete justice on the current cyber-crime related topic. Police is going through many problems like
Digital Evidence related difficulties and jurisdictional issues and lack of experienced experts on the
subject related to Cyber Crimes In its Police Station (Cyber Cell) and according to the traditional
court system Cybercrime itself. Jail reforms have not been able to change and reform is necessary in
the prison reform system. In Jail, there are people who commit a crime for some other purpose, but
such people learn the tendency to commit other crimes along with cyber-crime by living with other
criminals and towards crime in future. It has become extremely necessary to do corrective work in the
criminal justice system.
Cyber Fraud
Cyber Fraud is the crime committed via a computer with the intent to corrupt another individual’s
personal and financial information stored online.
Cyber fraud is the most common and threatening form of fraud which takes place internationally. The
cyber world has been expanding and growing throughout the twenty-first century, allowing fraudsters
to hack victims’ personal and financial information in a variety of ways. Fraudsters can use the
information which they gather to then financially fund themselves, or worryingly they might use this
money to fund terrorism.
Fraudsters can use the cyber world to gain access to victims’ personal identity, their online accounts
and their bank accounts. They can then use the money and information from this to fund terrorism.
The extensive and popular use of internet banking and mobile banking means there are more
opportunities than ever for criminals to commit cyber fraud. Cyber-crime and fraudsters normally try
to hack into victims’ personal and financial information online via phishing emails and viruses. If you
receive an email with an attached link which either asks you to present your bank information or to
confirm your bank account information, do not do so. The key to avoiding cyber-crime is to
understand what your bank and related bodies would ask of you, and they would never email or call
you asking for your bank information. Even if the email or the phone call sounds legitimate and
honest, you should call the bank yourself and ask them if this email originated from them or not.
Make sure you destroy all traces of your personal and financial information. If a bank has posted you
information with your bank details on, ensure that you shred this information, as a fraudster could find
this information in a bin and utilise it online to process a CNP payment. Furthermore, make sure you
protect your computer with an anti-virus software to combat any contact made between the fraudster
and your computer. If all of your preventive methods fail, you can always contact the relevant bodies
which have been established to combat cyber fraud.
Three types of Internet harassment are Cyber stalking, Cyber harassment and Cyber Bullying.
Cyber stalking: Cyber stalking is the use of the Internet, email or other electronic communications to
stalk, and generally refers to a pattern of threatening or malicious behaviours. Cyber stalking may be
considered the most dangerous of the three types of Internet harassment, based on a posing credible
threat of harm.
Many stalkers are motivated by a desire to exert control over their victims and engage in similar types
of behaviour to accomplish this end. Given the enormous amount of personal information available
through the Internet, a cyber stalker can easily locate private information about a potential victim.
The fact that cyber stalking does not involve physical contact may create the misperception that it is
more benign than physical stalking. This is not necessarily true. As the Internet becomes an ever more
integral part of our personal and professional lives, stalkers can take advantage of the ease of
communications as well as increased access to personal information. Whereas a potential stalker may
be unwilling or unable to confront a victim in person or on the telephone, he or she may have little
hesitation sending harassing or threatening electronic communications to a victim. As with physical
stalking, online harassment and threats may be a prelude to a more serious behaviour, including
physical violence.
Cyber harassment: There is no universal legal definition of cyber harassment, but it typically is
defined as repeated, unsolicited, threatening behaviour by a person or group using mobile or Internet
technology with the intent to bother, terrify, intimidate, humiliate, threaten, harass or stalk someone
else. The harassment can take place in any electronic environment where communication with others
is possible, such as on social networking sites, on message boards, in chat rooms or through email.
Cyber bullying: “Cyber bullying” is when a child, preteen or teen is tormented, threatened, harassed,
humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet,
interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least
have been instigated by a minor against another minor. Once adults become involved, it is plain and
simple cyber-harassment or cyber stalking.
Cyber bullying is the use of the Internet and related technologies to harm other people, in a deliberate,
repeated, and hostile manner.
It can be as simple as continuing to send e-mail or text harassing someone who has said they want no
further contact with the sender.
Email Spoofing
Email Spoofing is creating and sending an email with a modified sender's address. The sender's
address is forged in such a way that the receivers will trust the email, thinking it has been sent by
someone they know or from any trusted official source. After gaining their trust through a forged
address, the attackers can ask for sensitive information, such as personal data like bank details,social
security numbers, or organizational data like trade secrets and more.
Email Spoofing is a pretty common practice among cybercriminals because of the vulnerable and
weak email system. When you receive an email, the outgoing email servers have no way to determine
whether the sender's address is spoofed or original.
How does Email Spoofing work?
Cyber attackers perform Email Spoofing by changing the data of the email header. The email header
contains the essential information related to email. It includes data such as TO, FROM, DATE, and
SUBJECT. It also has the IP address of the sender.
For performing spoofing, the attacker needs to modify the FROM email address and the IP address. It
can be done easily through the Ratware application. A Ratware is a tool that can quickly adjust the
email header and send thousands of emails simultaneously to different recipients. The attackers also
need a Simple Mail Transfer Protocol (SMTP) server and mailing software for conducting spoofing
successfully.
As far as receivers' addresses are concerned, intruders can get them through various ways such as
data breaches, phishing, and more. People have a tendency to share their emails everywhere on the
internet, so it is not a big deal to get someone's email ID.
Use spam filters to avoid scammy emails. Most modern email providers such as Gmail,
Outlook, Yahoo, and others come with built-in spam filters, but you can also install a third-
party filter for added protection.
Thoroughly verify the legitimacy of an email that comes with unbelievable offers. You can
use the Google search or visit the official website of the senders to confirm the offer provided
in the email.
Avoid clicking on the links sent through emails.
Never share your confidential information over emails or phone calls, even if someone trusted
asks for it. No trusted organization asks for their customer's personal details on emails.
Never download or open the attachments from unknown emails.
Spamming
Spam is a form of email which is used to send to different email accounts and in general contains
advertising about any product or services. But the real problem is when they contain malwares that
can damage the user’s data.
Generally, they are sent to a massive list of emails for the mail purpose that a small percentage of
users might open them and respond. They are used to such treatment because they are cheap in
infrastructure investment, not too much time consuming and simple.
Techniques Used by Spammers
Domain Spoofing − The spammer sends an email on behalf of a known domain so the
receivers think that they know this person and open it.
Poisoning Filters − A filter can be poisoned by adding text with the same color of the
background to reduce the scoring of the filters.
Directory Harvesting − In directory harvesting, spammers generate email addresses by using
known email addresses from corporates or ISP (Internet Service Provider).
Social Engineering − Spammers send promotional emails to different users such as offering
huge discounts and tricking them to fill their personal data.
Junk Tags − Spam Words can be hidden by including invalid HTML tags within the words.
Invalid words − Special characters are inserted in the spam words.
Anti–Spam Techniques
Signature Based Content Filtering − Most anti-spam email companies use this type of
filtering because it checks the received email with certain patterns after saving the message to
the disk.
Naive Bayes Spam Filtering − Bayesian filter scans the context of the e-mail when it looks
for words or character strings that will identify the e-mail as spam.
Black Listing RBL − This is a type of database that updates the IP address and domains
based on a reputation and the system administrators who use these RBL don’t receive email
from domains that are blacklisted from this RBL.
Sender Policy Framework − The IP address of the domain of the sender is compared with
the genuine list of the IP addresses that the domain should have and if it is not same, then that
email is dropped.
While techniques may vary depending on the type of cybercrime being investigated, as well as who is
running the investigation, most digital crimes are subject to some common techniques used during the
investigation process.
Background check: Creating and defining the background of the crime with known facts will
help investigators set a starting point to establish what they are facing, and how much
information they have when handling the initial cybercrime report.
Information gathering: One of the most important things any cybersecurity researcher must
do is grab as much information as possible about the incident.A lot of national and federal
agencies use interviews and surveillance reports to obtain proof of cybercrime. Surveillance
involves not only security cameras, videos and photos, but also electronic device surveillance
that details what's being used and when, how it's being used, and all the digital behavior
involved.
Tracking and identifying the authors: This next step is sometimes performed during the
information-gathering process, depending on how much information is already in hand. In
order to identify the criminals behind the cyber attack, both private and public security
agencies often work with ISPs and networking companies to get valuable log information
about their connections, as well as historical service, websites and protocols used during the
time they were connected.
This is often the slowest phase, as it requires legal permission from prosecutors and a court
order to access the needed data.
Digital forensics: Once researchers have collected enough data about the cybercrime, it's time
to examine the digital systems that were affected, or those supposed to be involved in the
origin of the attack. This process involves analyzing network connection raw data, hard
drives, file systems, caching devices, RAM memory and more. Once the forensic work starts,
the involved researcher will follow up on all the involved trails looking for fingerprints in
system files, network and service logs, emails, web-browsing history, etc.
Proxy server is a computer on a network which acts as an intermediary for connections with other
computers on that network. The attacker first connects to a proxy server and establishes a connection
with the target system through existing connection with proxy.
An Anonymizers or an anonymous proxy is a tool that attempts to make activity on the Internet
untraceable. It accesses the Internet on the user’s behalf, protecting personal information by hiding the
source computer’s identifying information
While checking electronic mail (E-Mail) one day a user finds a message from the bank threatening
him/her to close the bank account if he/she does not reply immediately. Although the message seems
to be suspicious from the contents of the message, it is difficult to conclude that it is a fake/false
EMail.
Password Cracking
Password is like a key to get an entry into computerized systems like a lock. Password cracking is a
process of recovering passwords from data that have been stored in or transmitted by a computer
system.
Keystroke logging, often called key logging, is the practice of noting (or logging) the keys struck on a
keyboard, typically in a covert manner so that the person using the keyboard is unaware that such
actions are being monitored.
1. Software Key loggers- software programs installed on the computer systems which
usually are located between the OS and the keyboard hardware, and every keystroke
is recorded.
2. Hardware Key loggers- To install these key loggers, physical access to the computer
system is required. Hardware key loggers are small hardware devices.
3. Anti keylogger – Anti keylogger is a tool that can detect the keylogger installed on
the computer system and also can remove the tool.
Spywares
Spyware is a type of malware that is installed on computers which collects information about users
without their knowledge.
Computer virus is a program that can “infect” legitimate programs by modifying them to include a
possibly “evolved” copy of itself. Viruses spread themselves, without the knowledge or permission of
the users, to potentially large numbers of programs on many machines.
Trojan Horses
Trojan Horse is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and cause harm, for example,
ruining the file allocation table on the hard disk. A Trojan Horse may get widely redistributed as part
of a computer virus.
Backdoor
SQL Injection
Structured Query Language (SQL) is a database computer language designed for managing data in
relational database management systems (RDBMS). SQL injection is a code injection technique that
exploits a security vulnerability occurring in the database layer of an application. The vulnerability is
present when user input is either filtered incorrectly for string literal escape characters embedded in
SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an
instance of a more general class of vulnerabilities that can occur whenever one programming or
scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion
attacks.
Buffer Overflow
Buffer overflow, or buffer overrun, is an anomaly where a process stores data in a buffer outside the
memory the programmer has set aside for it. The extra data overwrites adjacent memory, which may
contain other data, including program variables and program flow control data. This may result in
erratic program behavior, including memory access errors, incorrect results, program termination (a
crash) or a breach of system security.
What is a phishing attack?
Phishing is a type of social engineering attack often used to steal user data, including login credentials
and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim
into opening an email, instant message, or text message. The recipient is then tricked into clicking a
malicious link, which can lead to the installation of malware, the freezing of the system as part of
a ransomware attack or the revealing of sensitive information.An attack can have devastating results.
For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.
An organization succumbing to such an attack typically sustains severe financial losses in addition to
declining market share, reputation, and consumer trust. Depending on scope, a phishing attempt might
escalate into a security incident from which a business will have a difficult time recovering.
Phishing Techniques
Spear Phishing- While traditional phishing uses a 'spray and pray' approach, meaning mass emails are
sent to as many people as possible, spear phishing is a much more targeted attack in which the hacker
knows which specific individual or organization they are after. They do research on the target in order
to make the attack more personalized and increase the likelihood of the target falling into their trap.
Session Hijacking- In session hijacking, the phisher exploits the web session control mechanism to steal
information from the user. In a simple session hacking procedure known as session sniffing, the
phisher can use a sniffer to intercept relevant information so that he or she can access the Web server
illegally.
Email/Spam- Using the most common phishing technique, the same email is sent to millions of users
with a request to fill in personal details. These details will be used by the phishers for their illegal
activities. Most of the messages have an urgent note which requires the user to enter credentials to
update account information, change details, or verify accounts. Sometimes, they may be asked to fill
out a form to access a new service through a link which is provided in the email.
Content Injection- Content injection is the technique where the phisher changes a part of the content on
the page of a reliable website. This is done to mislead the user to go to a page outside the legitimate
website where the user is then asked to enter personal information.
Web Based Delivery- Web based delivery is one of the most sophisticated phishing techniques. Also
known as “man-in-the-middle,” the hacker is located in between the original website and the phishing
system. The phisher traces details during a transaction between the legitimate website and the user. As
the user continues to pass information, it is gathered by the phishers, without the user knowing about
it.
Phishing through Search Engines- Some phishing scams involve search engines where the user is
directed to products sites which may offer low cost products or services. When the user tries to buy
the product by entering the credit card details, it’s collected by the phishing site. There are many fake
bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites.
Vishing (Voice Phishing)- In phone phishing, the phisher makes phone calls to the user and asks the user
to dial a number. The purpose is to get personal information of the bank account through the phone.
Phone phishing is mostly done with a fake caller ID.
Smishing (SMS Phishing)- Phishing conducted via Short Message Service (SMS), a telephone-based text
messaging service. A smishing text, for example, attempts to entice a victim into revealing personal
information via a link that leads to a phishing website.
Link Manipulation- Link manipulation is the technique in which the phisher sends a link to a malicious
website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the
website mentioned in the link. Hovering the mouse over the link to view the actual address stops users
from falling for link manipulation.
Keyloggers- Keyloggers refer to the malware used to identify inputs from the keyboard. The
information is sent to the hackers who will decipher passwords and other types of information. To
prevent key loggers from accessing personal information, secure websites provide options to use
mouse clicks to make entries through the virtual keyboard.
Malware- Phishing scams involving malware require it to be run on the user’s computer. The malware
is usually attached to the email sent to the user by the phishers. Once you click on the link, the
malware will start functioning. Sometimes, the malware may also be attached to downloadable files.
Trojan- A Trojan horse is a type of malware designed to mislead the user with an action that looks
legitimate, but actually allows unauthorized access to the user account to collect credentials through
the local machine. The acquired information is then transmitted to cybercriminals.
Ransomware- Ransomware denies access to a device or files until a ransom has been
paid. Ransomware for PC's is malware that gets installed on a user’s workstation using a social
engineering attack where the user gets tricked in clicking on a link, opening an attachment, or clicking
on malvertising.
Malvertising- Malvertising is malicious advertising that contains active scripts designed to download
malware or force unwanted content onto your computer. Exploits in Adobe PDF and Flash are the
most common methods used in malvertisements.
Two-factor authentication (2FA) adds an extra verification layer when logging in to sensitive
applications.
In addition organizations should enforce strict password management policies. Employees should be
required to frequently change their passwords and to not be allowed to reuse a password for multiple
applications.
Educational campaigns can also help diminish the threat of phishing attacks by enforcing secure
practices, such as not clicking on external email links.
Unit 4
Cyber Forensics Investigation Tools
Autopsy
Autopsy is a digital forensics platform and graphical interface that forensic investigators use to
understand what happened on a phone or computer. It aims to be an end-to-end, modular solution that
is intuitive out of the box. Select modules in Autopsy can do timeline analysis, hash filtering, and
keyword search. In addition, they can extract web artifacts, recover deleted files from unallocated
space, and find indicators of compromise. All of this can be done relatively rapidly.
Autopsy runs background jobs in parallel so that even if a full search takes hours, a user will know
within minutes whether targeted keywords have been found. In addition, investigators working with
multiple devices can create a central repository through Autopsy that will flag phone numbers, email
Bulk Extractor
Bulk Extractor scans a file, directory, or disk image. It extracts information without parsing the file
system or file system structures, allowing it to access different parts of the disk in parallel, making it
faster than the average tool. The second advantage of Bulk Extractor is that it can be used to process
practically any form of digital media: hard drives, camera cards, smartphones, SSDs, and optical
drives.
The most recent versions of Bulk Extractor can perform social network forensics and extract
addresses, credit card numbers, URLs, and other types of information from digital evidence. Other
capabilities include creating histograms based on frequently used email addresses and compiling word
All extracted information can be processed either manually or with automated tools, one of which
incorporates context-specific stop lists (i.e., search terms flagged by the investigator) that remove
COFEE
Microsoft’s Computer Online Forensic Evidence Extractor (COFEE) is a forensic toolkit that extracts
evidence from Windows computers. The toolkit acts as an automated forensic tool during a live
analysis. It contains more than 150 features and a graphical user interface that guides an investigator
through data collection and examination and helps generate reports after extraction. Password
decryption, internet history recovery, and other data collection forms are all included in the toolkit.
Microsoft claimed that COFEE had reduced three- to four-hour tasks to under 20 minutes at the time
of its release. In addition, thousands of law enforcement agencies worldwide (including INTERPOL)
CAINE offers a full-scale forensic investigation platform designed to incorporate other tools and
modules into a user-friendly graphic interface. Its interoperable environment is intended to assist
investigators in all four stages of an investigation: preservation, collection, examination, and analysis.
In addition, it comes with dozens of pre-packaged modules (Autopsy, listed above, is among them).
Digital Forensics Framework (DFF) is an open-source computer forensics platform built upon a
dedicated Application Programming Interface (API). Equipped with a graphical user interface for
simple use and automation, DFF guides a user through the critical steps of a digital investigation and
The tool can be used to investigate hard drives and volatile memory and create reports about system
EnCase
EnCase is considered the gold standard in forensic cybersecurity investigations, including mobile
acquisitions. It has offered forensic software to help professionals find evidence to testify in criminal
investigation cases involving cybersecurity breaches by recovering evidence and analyzing files on
It features platforms which reduces the amount of content for investigators to review to close cases
faster manually.
Analyzing a computer’s physical random access memory (RAM), MAGNET RAM Capture enables
cybersecurity investigators to recover and analyze digital artifacts stored in a computer’s memory.
Using a small memory footprint, digital forensic investigators can use the tool and minimize the
analysis tools.
Redline
Redline provides endpoint security and investigative capabilities to its users. It is mainly used to
perform memory analysis and look for infection or malicious activity signs. Still, it can also be used to
collect and correlate data around event logs, the registry, running processes, file system metadata, web
Redline has more applications in cybersecurity and other tech-driven criminal behavior where a
Tor
When surveillance is a security threat, applications like Tor help PC and mobile device users be
undetectable. Tor allows users to browse anonymously and prevent identity theft through increased
internet security. This is useful when users need to access websites while visiting other countries,
protect their identity, or be difficult to trace. In addition, it blocks browser plugins such as Flash, Real
Player, QuickTime, and others. Tor suggests iOS users use their Onion Browser for private browsing
Volatility
The Volatility Foundation is a nonprofit organization whose mission is to promote the use of memory
analysis within the forensics community. Its primary software is an open-source framework for
incident response and malware detection through volatile memory (RAM) forensics. This allows the
preservation of evidence in memory that would otherwise be lost during a system shutdown.
Written in Python and supportive of almost all 32-bit and 64-bit machines, it can sift through cached
sectors, crash dumps, DLLs, network connections, ports, process lists, and registry files.
Types of Evidence:
Collecting the shreds of evidence is really important in any investigation to support the claims in
court. Below are some major types of evidence.
Real Evidence: These pieces of evidence involve physical or tangible evidence such as flash
drives, hard drives, documents, etc. an eyewitness can also be considered as a shred of tangible
evidence.
Hearsay Evidence: These pieces of evidence are referred to as out-of-court statements. These
are made in courts to prove the truth of the matter.
Original Evidence: These are the pieces of evidence of a statement that is made by a person
who is not a testifying witness. It is done in order to prove that the statement was made rather
than to prove its truth.
Testimony: Testimony is when a witness takes oath in a court of law and gives their statement
in court. The shreds of evidence presented should be authentic, accurate, reliable, and
admissible as they can be challenged in court.
The preliminary information at the incident scene offers the following details:
The type of incident.
Reason for the occurrence of the incident.
The potential damage due to the incident.
Potential evidence from scattered objects outside the attacked system.
Details of the person who used the system last before the incident.
People who first knew about the incident’s occurrence.
Incident Response: Different Situations
The activity the first responder performs at the incident location has a great impact over the
investigation processes and can influence the accuracy or the success of the investigation procedure.
Therefore, investigation firms need to be careful while deciding the first response team for an
incident.
Incident Handling
Computer security incidents are some real or suspected offensive events related to cybercrime and
cybersecurity and computer networks. Forensics investigators or internal cybersecurity professionals
are hired in organizations to handle such events and incidents, known as incident handlers.
1. Capacity – capacity refers to the amount of information that can be hidden in cover medium .
The amount of information that can be hidden is governed by the fact that information hidden
should not completely alter the original message, in order to avoid the attention of unintended
user.
2. Security – the information hiding method should provide security for data such that only the
intended user can gain access to it. In order words, it refers to the inability of un-authorized
user to detect hidden information. This is very crucial to protect the confidentiality and
sensitivity of information being sent .
3. Robustness – it refers to the amount of information that can be hidden without showing any
negative effects and destroying hidden information .
4. Perceptibility – the data hiding method should hide data in such a manner that the original
cover signal and the hidden data signal are perceptually indistinguishable.
Email forensics is a branch of digital forensics that focuses on the forensic analysis of email to collect
digital evidence for cybersecurity attacks and cyber incidents. It comprises an in-depth forensic
investigation of various email aspects such as Message-IDs, transmission routes, attached files and
documents, IP addresses of servers and computers, etc.
Email forensic professionals use the following techniques to examine emails and analyze the digital
evidence:
Email headers contain essential information, including the name of the sender and receiver, the path
(servers and other devices) through which the message has traversed, etc.
The vital details in email headers help investigators and forensics experts in the email investigation.
For instance, the Delivered-To field contains the recipient’s email address, and the Received-By field
contains:
Email servers are investigated to locate the source of an email. For example, if an email is deleted
from a client application, sender’s, or receiver’s, then related ISP or Proxy servers are scanned as they
usually save copies of emails after delivery. Servers also maintain logs that can be analyzed to
identify the computer’s address from which the email originated.
In some cases, logs of servers are not available.In such an event, investigators can refer to the logs
maintained by network devices such as switches, firewalls, and routers to trace the source of an email
message.
X-headers are email headers that are added to messages along with standard headers,
like Subject and To. These are often added for spam filter information, authentication results, etc.,
and can be used to identify the software handling the email at the client. In addition, it can be used to
find the original sender, i.e., the IP address of the sender’s computer.
5. Message-IDs
Message-ID is a unique identifier that helps forensic examination of emails across the globe. It
comprises a long string of characters that end with the Fully Qualified Domain Name (FQDN).
Message IDs are generated by client programs that send emails, such as Mail User Agents (MUA) or
Mail Transfer Agents (MTA). There are two parts of a Message-ID. One part is before @, and another
part is after @. The first part of the message-ID contains information, such as the message’s
timestamp. This information is the data regarding the time when the message was sent. The second
part of the Message-ID contains information related to FQDN.
Sometimes, the email software used by a sender can include additional information about the message
and attached files in the email. An in-depth analysis of these sections can reveal vital details related to
the sender, like the MAC address, Windows login username of the sender, etc.
7. Bait Tactics
The bait tactic is an email investigation technique used when the location of a suspect or
cybercriminal is unknown. In this, the investigators send the suspect an email containing an http:
“<img src>” tag. The image source is on a computer that the investigators monitor. When the suspect
opens the email, the computer’s IP address is registered in a log entry on the HTTP server that hosts
the image. The investigators can use the IP address to track the suspect. Sometimes, suspects take
preventive measures like using a proxy server to protect their identity. In that case, the IP address of
the proxy server is recorded. However, the log on the proxy server can be analyzed to track the
suspect.
Date and time are two attributes of emails considered necessary when they are produced as evidence
related to a case. However, emails can be forged like physical documents, and hackers may tamper
with these attributes. In addition, since an email doesn’t directly reach from the receiver to the sender,
recording its actual route with accurate timings is a tricky aspect.
It’s a standard practice to use MD5 and SHA1 hashing algorithms in email forensics investigations.
These algorithms allow forensic investigators to preserve digital evidence from the moment they
acquire it until it is produced in a court of law. Another reason why hash values are important is that
electronic documents are shared with legal professionals and other parties during the investigation.
Therefore, ensuring that everyone has identical copies of the files is crucial.
Tracking Tools
Cookies. Cookies are computer files that are stored on a user's computer during a visit to a web site.
When the user electronically enters the web site, the host computer automatically loads the file(s) to
the user's computer.
The cookie is a tracking device, which records the electronic movements made by the user at the site,
as well as identifiers such as a username and password. Commercial web sites make use of cookies to
allow a user to establish an account on the first visit to the site and so to avoid having to enter account
information (i.e., address, credit card number, financial activity) on subsequent visits. User
information can also be collected unknown to the user and subsequently used for whatever purpose
the host intends.
Cookies are files, and so can be transferred from the host computer to another computer. This can
occur legally (i.e., selling of a subscriber mailing list) or illegally (i.e., "hacking in" to a host computer
and copying the file). Also, cookies can be acquired as part of a law enforcement investigation.
Stealing a cookie requires knowledge of the file name. Unfortunately, this information is not difficult
to obtain. Cookies may be disabled by the user, however, this calls for programming knowledge that
many users do not have .
Bugs or Beacons. A bug or a beacon is an image that can be installed on a web page or in an email.
Unlike cookies, bugs cannot be disabled. They can be prominent. As examples of the latter, graphics
that are transparent to the user can be present, as can graphics that are only 1x1 pixels in size
(corresponding to a dot on a computer monitor). When a user clicks onto the graphic in an attempt to
view, or even to close the image, information is relayed to the host computer.
When used as a marketing tool or means for an entrepreneur to acquire information about the
consumer, bugs or beacons can be merely an annoyance. However, the acquisition of IP addresses and
other user information can be used maliciously. For example, information on active email addresses
can be used to send "spam" email or virus-laden email to the user.
Active X, Java Script. These computer-scripting languages are automatically activated when a site is
visited. The mini-programs can operate within the larger program, so as to create the "pop-up"
advertiser windows that appear with increasing frequency on web sites. When the pop-up graphic is
visited, user information such as described in the above sections can be gathered.
Tracing email. Email transmissions have several features that make it possible to trace their passage
from the sender to the recipient computers. For example, every email contains a section of
information that is dubbed the header. Information concerning the origin time, date, and location of
the message is present, as is the Internet address (IP) of the sender's computer.
If an alias has been used to send the message, the IP number can be used to trace the true origin of the
transmission. When the message source is a personally owned computer, this tracing can often lead
directly to the sender. However, if the sending computer serves a large community—such as a
university, and through which malicious transmissions are often routed—then identifying the sender
can remain daunting.
Depending on the email program in use, even a communal facility can have information concerning
the account of the sender.
The information in the header also details the route that the message took from the sending computer
to the recipient computer. This can be useful in unearthing the identity of the sender.
Chat rooms. Chat rooms are electronic forums where users can visit and exchange views and
opinions about a variety of issues. By piecing together the electronic transcripts of the chat room
conversations, enforcement officers can track down the source of malicious activity.
Unit 5
Cyber Law (IT Law) in India
Cyber Law also called IT Law is the law regarding Information-technology including computers and
the internet. It is related to legal informatics and supervises the digital circulation of information,
software, information security, and e-commerce.
IT law does not consist of a separate area of law rather it encloses aspects of contract, intellectual
property, privacy, and data protection laws. Intellectual property is a key element of IT law.
Importance of Cyber Law:
1. It covers all transactions over the internet.
2. It keeps eye on all activities over the internet.
3. It touches every action and every reaction in cyberspace.
2. Copyright:
The internet has made copyright violations easier. In the early days of online communication,
copyright violations were too easy. Both companies and individuals need lawyers to bring an
action to impose copyright protections. Copyright violation is an area of cyber law that protects
the rights of individuals and companies to profit from their creative works.
3. Defamation:
Several personnel uses the internet to speak their mind. When people use the internet to say
things that are not true, it can cross the line into defamation. Defamation laws are civil laws that
save individuals from fake public statements that can harm a business or someone’s reputation.
When people use the internet to make statements that violate civil laws, that is called
Defamation law.
5. Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws forbid certain
behaviors online, freedom of speech laws also allows people to speak their minds. Cyber
lawyers must advise their clients on the limits of free speech including laws that prohibit
obscenity. Cyber lawyers may also defend their clients when there is a debate about whether
their actions consist of permissible free speech.
6. Trade Secrets:
Companies doing business online often depend on cyber laws to protect their trade secrets. For
example, Google and other online search engines spend lots of time developing the algorithms
that produce search results. They also spend a great deal of time developing other features like
maps, intelligent assistance, and flight search services to name a few. Cyber laws help these
companies to take legal action as necessary to protect their trade secrets.
Digital signatures have been given legal validity and sanction in the Act.
It has opened the doors for the entry of corporate companies for issuing Digital Signatures
Certificates in the business of being Certifying Authorities.
It gives authority to the companies or organizations to file any form, application, or any other
document with any office, authority, body, or agency owned or controlled by the suitable
Government in e-form using such e-form as may be prescribed by the suitable Government.
The IT Act also addresses the important issues of security, which are so critical to the success
of electronic transactions.
In cyberspace, sometimes one person makes a profit by using another person’s creation without the
owner’s consent. This is a violation of privacy, and it is protected by IPR. We have certain laws to
avoid violation of Intellectual Property Rights in cyberspace .
Copyright Infringement:
Copyright protection is given to the owner of any published artistic, literary, or scientific work over
his work to prohibit everyone else from exploiting that work in his name and thereby gain profit from
it.
When these proprietary creations are utilized by anyone without the permission of the owner, it leads
to copyright infringement. If copies of any software are made and sold on the internet without the
permission of the owner or even copying the content from any online source, these all are examples of
copyright infringement.
Copyright Issues in Cyberspace :
1. Linking –
It permits a Website user to visit another location on the Internet. By simply clicking on a word or
image on one Web page, the user can view another Web page elsewhere on the same server as the
original page.
Linking damages the rights or interests of the owner of the Linked webpage. It may create the
supposition that the two linked sites are the same and promote the same idea. In this way, the linked
sites can lose their income as it is often equal to the number of persons who visit their page.
2. Software Piracy –
Software piracy refers to the act of stealing software that is lawfully shielded. This stealing comprises
various actions like copying, spreading, altering, or trading the software. It also comes under the
Indian copyright act.
An example of software piracy is downloading a replica of Microsoft Word from any website other
than Microsoft to avoid paying for it as it is a paid software.
3. Cybersquatting –
Cybersquatting means unauthorized registration and use of Internet domain names that are similar to
any business’s trademarks, service marks, or company names. For example, let us consider Xyz is a
very famous company and the company hadn’t created a website yet. A cybersquatter could buy
xyz.com, looking to sell the domain to the company Xyz at a later date for a profit. The domain name
of a famous company can even be used to attract traffic and this traffic will help cybersquatters earn a
lot of money through advertising.
JURISDICTION IN CYBERSPACE
‘Jurisdiction’, as applied to a particular claim or controversy, is the power to hear and determine that
controversy. The term imports authority to apply the laws, and excludes the idea of power to make the
laws. It refers to the local extent within which the court can and does exercise the right when
ascertained. The law relating to crimes would generally require that the courts within a state would
have jurisdiction to try and adjudicate upon all such offences committed by a person within the
territorial boundaries of such a court. However, the exceptions have been created where even though,
technically and strictly, the offender might not have committed the crime on the soil of the country,
yet the courts would exercise jurisdiction over such an offender.
There are six generally accepted bases of jurisdiction or theories under which a state may claim to
have jurisdiction to prescribe a rule of law over an activity.
Subjective territoriality If an activity takes place within the territory of the particular country, then
the said country has the jurisdiction to regulate and punish for such activity. For instance, section 2 of
the Indian Penal Code provides for punishment of offences committed within India.
Objective territoriality is invoked where the action takes place outside the territory of the forum
state, but the primary effect of that activity is within the forum state. Commonly known as the
‘effects’ doctrine is the situation , where the action takes place outside the territory of a country, but
the primary effect of that activity is within the said country, it assumed jurisdiction. For instance, a
person from Pakistan shoots across the border and an Indian is injured in the process. Though the
action was initiated in Pakistan, the effect was in India.
Nationality is the basis for jurisdiction where the forum state asserts the right to prescribe a law for
an action based on the nationality of the actor. For instance, the Indian Penal Code stipulates that the
provisions of the Code would also apply to any offence committed by any citizen of India in any place
without and beyond India.
Passive nationality is a theory of jurisdiction based on the nationality of the victim. Passive and
“active” nationality are often invoked together to establish jurisdiction because a state has more
interest in prosecuting an offense when both the offender and the victim are nationals of that state.
The Protective principle expresses the desire of a sovereign to punish actions committed in other
places solely because it feels threatened by those actions. This principle is invoked where the “victim”
would be the government or sovereign itself. This principle is not preferred for the obvious reason that
it can easily offend the sovereignty of another nation.
Lastly, nations also exercise a Universal jurisdiction with respect to certain offences. Sea piracy has
been, for long, a part of this jurisdiction. Any nation could have captured and punished pirates. This
form of jurisdiction has been expanded lately to include slavery, genocide, and hijacking (air piracy).
For instance, Article 105 of the United Nations Convention on the Law of the Sea stipulates that on
the high seas, or in any other place outside the jurisdiction of any State, every State may seize a pirate
ship or aircraft, or a ship or aircraft taken by piracy and under the control of pirates, and arrest the
persons and seize the property on board. It further provides that the courts of the state which carried
out the seizure may decide upon the penalties to be imposed, and may also determine the action to be
taken with regard to the ships, aircraft or property, subject to the rights of third parties acting in good
faith.