E-Brochure info@us-council.com
US Council
  • Home
  • Services
    • Security Testing Services
    • Mobile Phones
    • Proactive Services
    • Incident Response
    • Forensics
    • Test Frameworks
    • Compliance Audit
  • Products
    • US-DR-Suite
    • US-Forensic Field Kit
  • Training
    • Cybersecurity Professional
    • Ethical Hacking & Prevention
    • Network Penetration Testing
          Expert
    • Network Security Expert
    • Digital Forensics Expert
    • Mobile Forensics Expert
    • Wireless Security Expert
    • Certifications
    • Certificate Verification
    • Webinar
  • About Us
  • News
  • Contact Us
  • News

Cyber Forensics: The Next Frontier in Cybersecurity

27 November 2017 Brendan Saltaformaggio
images

We can now recover evidence from the RAM on a cellphone, even if the account is locked, and use it to prosecute a case.

Every day at Georgia Tech's College of Engineering, my lab helps to solve real crimes through cyber forensics, the application of investigation and analysis techniques to gather and preserve evidence from a computing device that can be presented in a court of law. My research has large-scale crime-solving implications, and my goal is to figure out how we can collect as much evidence as possible from any device involved in the crime to help put away the criminal.

Since I arrived at Georgia Tech, my lab has been hard at work to create forensic techniques that help investigators solve human crimes, in addition to tackling malware and cyber attacks. If someone robs a bank and drops his phone at the scene of the crime, we can mine that digital device for evidence that will help prosecute the case.

One of the primary focuses of my research is memory image forensics, the process of recovering evidence from the RAM (random access memory) of a device. I recently developed a cyber-forensic technique called RetroScope to recover encrypted information on a device, even if the user has locked his or her accounts. RetroScope leverages a copy of the memory (RAM data) from the device and recreates information such as texts or emails. An investigator can see entire sequences of app screens that were previously accessed by the user.

Terrorists are known to use an application called Telegram that is extremely secure and encrypts everything on the phone. With RetroScope, the data on the phone is recreated and made available to law enforcement. An investigator can see exactly what the suspect was communicating before or during the crime. Any data left on the memory of the device can be extracted and used as evidence.

In a recent case, cyber forensics was used at a restaurant where patrons' credit card information was being stolen. A forensic investigator was called in, but he couldn't crack the case. With more customers being hacked, the restaurant was finally sued, and management called in a more-advanced forensic analyst to look over its systems. The forensic analyst realized there was malware on the restaurant's point-of-sale system, exporting credit card information with each swipe. The hacker was leveraging the volatile RAM (e.g., the system's short-term memory) to hide the malware, and the first investigator missed it.

The first investigator was only considering the static files stored on the disk of the computer. At the time, the forensic investigator wasn't considering volatile RAM as a hiding place for malware. From research like mine, investigators now know that a device's RAM is a viable place to harbor malware. You have to look everywhere in these investigations, leaving no stone unturned. My lab and I are continuing to pioneer the investigation of volatile RAM and the power of memory forensics in cases such as this.

At present, investigating crimes that involve digital devices as evidence is done in a very ad hoc manner, with much digital evidence being left behind. We need to design more holistic cyber-forensic techniques that take into account the entire digital system, and not just a single piece of evidence that investigators happen to find. This requires a paradigm shift in the way people think about cyber forensics. It's no longer just a tool to be used in a larger investigation; it's actually the driver of the investigation itself.

  • Security Testing Services
  • Mobile Phones
  • Proactive Services
  • Incident Response
  • Forensics
  • Test Frameworks
  • Compliance Audit

Popular Posts

  • Cybersecurity in the Biden Administration: Experts Weigh In
  • Worst Malware and Threat Actors of 2018
  • Destructive Cyberattacks Spiked in Q3
  • A Cybersecurity Weak Link: Linux and IoT
  • A False Sense of Security
  • 4 Traits of a Cyber-Resilient Culture
  • Managing Data the Way We Manage Money
  • New Apache Struts Vulnerability Leaves Major Websites Exposed
Our Services
  • Security Testing Services
  • Mobile Phones
  • Proactive Services
  • Incident Response
  • Forensics
  • Test Frameworks
  • Compliance Audit
Quick Links
  • Certifications
  • Certificate Verification
  • About Us
  • News
  • Contact Us
Follow Us
2022 US Council. All rights reserved.