This scenario was much broader than most, and notice how that invited many more responses and a great diversity in paths to pursue. Sometimes the most challenging of an investigation is knowing which initial #InvestigationPath to take.
That effect is a product of the path itself and the evidence being examined.
There is often a best opening move in a scenario, but in those like the one I’ve shared here, there isn’t an obvious opening move without gaining more information first.
When you forecast for this event, one strategy might be an exfil investigation; trying to find data being moved. That could mean exfil by email, USB, file storage site upload, remote access, or some other mechanism.
Another path mentioned a lot might be understanding what the user accessed in the time window preceding their departure. Looking at authentications, file and object access, etc.
An approach that wasn't mentioned much was looking for staging actions like the creation of archive files to make data easier to move. I chose Vikas (on LinkedIn) as the response of the week for mentioning this idea. It’s not always a home run, but it’s quick to investigate.
Lots of great responses. A parting thought for this scenario — how would the investigation be different if the scenario changed from an insider stealing information to an external attacker stealing information?
• • •
Missing some Tweet in this thread? You can try to
force a refresh
When an attacker gains initial access to a system on a network, common actions are:
1. Scanning the network for pivot targets 2. Pillaging the system for valuable files 3. Stealing credentials from the system
Each provides an opportunity for honeypot-based detection 🧵
1/
When an attacker is scanning the network for pivot targets, a listening honey service on a common port that is placed on that network segment is likely to receive a probe. That probe generates an alert indicating the compromised source host.
2/
When an attacker is pillaging the system for useful files, an enticingly named honey file is likely to be accessed (either directly or after exfil). When opened, that file contacts a listening server that generates an alert.
One of the underappreciated benefits of the increased acceptance of remote work — it makes more jobs accessible to folks with disabilities. Since April 2020, the amount of disabled folks participating in the workforce has increased 5%. bloomberg.com/news/articles/…
Even when a workplace is accessible to someone with a disability (and despite the ADA, many are not), the commute there may not be. Eliminating. that commute opens up a lot of possibilities.
The benefits here are not just about new folks gaining access to the workforce…it’s also a win that disabled folks already working have access to a greater number and diversity of jobs. More options means more social mobility.
I was speaking to a security team earlier this week and we spent some time talking about creating a culture of curiosity. A few things I shared... 1/ 🧵
Curiosity is the desire to know something, and it's one of the most important traits security practitioners can possess. 2/
The more curious you are, the faster you learn and gain experience. We often describe experience in terms of years, but quality and diversity of experience are usually more important than duration. 3/
The digital forensic investigation is the systematic inquiry and examination of evidence to gain an accurate perception of whether a compromise has occurred, and to what extent.
Digital forensics is... the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital sources to facilitate or further... (cont.)
...the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
An Investigation Theory student asked me a good question last week -- Do you need to understand how a specific malware strain works to investigate a system where you suspect it might be present? Let's talk about it. 1/
Any time you suspect specific malware is on a system, it probably means you have some existing evidence indicating the presence of that malware. Perhaps, an IDS alert. 2/
That alert (or other initial evidence) is one artifact that malware exists on a system. More often than not, you need to confirm that malware is actually on the system by finding at least one more artifact of its execution. 3/
Sometimes I dream about investigation techniques (perfectly normal). I had a dream a couple of nights ago that I was forced to use parallel construction to resolve a case.
Are you familiar with the concept or parallel construction?
🧵 1/
Parallel construction is a process an investigator uses to build a case toward a conclusion using an alternate evidentiary basis. The practice mostly comes from law enforcement. 2/
Let's say that detective Sally figures out Bob murdered someone, but only because she obtained some evidence in a manner that wouldn't hold up in court. Could be coerced, warrantless, intentional, accidental, whatever. 3/