24
ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCE CONFERENCE Digital Forensics in Fraud & Corruption Investigations Digital Forensics in Fraud & Corruption Investigations 9 9 October October 2014 2014 9 9 October October 2014 2014 Leisure Lodge Hotel, Leisure Lodge Hotel, Diani Diani Kenya Kenya Faith Faith Basiye, CFE Basiye, CFE Head Group Forensic Services Head Group Forensic Services KCB Banking Group KCB Banking Group

ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Embed Size (px)

Citation preview

Page 1: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE

Digital Forensics in Fraud & Corruption InvestigationsDigital Forensics in Fraud & Corruption Investigations

9 9 October October 201420149 9 October October 20142014

Leisure Lodge Hotel, Leisure Lodge Hotel, DianiDiani

KenyaKenya

Faith Faith Basiye, CFEBasiye, CFEHead Group Forensic ServicesHead Group Forensic Services

KCB Banking GroupKCB Banking Group

Page 2: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

"This is a truly remarkable attack, but not

just in its scope — hackers successfully

penetrated one of the most secure

organizations on this planet and they

stole absolutely nothing of value — no

money, no Social Security numbers, no

passwords," John Gunn Vasco Data

Security International in Chicago

Page 3: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

On The MenuOn The Menu

Cyber crime case studiesCyber crime case studies

Digital ForensicsDigital Forensics

Digital Forensic InvestigationsDigital Forensic InvestigationsDigital Forensic InvestigationsDigital Forensic Investigations

Digital Forensic toolsDigital Forensic tools

Page 4: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

DefinitionDefinition

Cybercrime - Criminal activity committed with the aid of or in the arena of the internet and similar telecommunication technologies

It is both a new incarnation of old crimes through a new medium and a unique entity all its ownnew medium and a unique entity all its own

Page 5: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Cyber Attack Threat TrendsCyber Attack Threat Trends

Internet social engineering attacks

Network sniffers

Logic Logic bombs bombs

Worms/ virusesWorms/ virusesWorms/ virusesWorms/ viruses

TrojansTrojans

Exploited Exploited vulnerabilities vulnerabilities

UnUn--authorized authorized reproduction of computer reproduction of computer

programs or software piracyprograms or software piracy

Page 6: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Cyber Attack Threat TrendsCyber Attack Threat Trends

Cyber-threats & bullying

Automated probes and scans

GUI intrusion tools

Automated widespread attacksAutomated widespread attacks

Widespread, distributed denial-of-service attacks

Industrial espionage

Executable code attacks (against browsers)

Page 7: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Cyber Attack Threat TrendsCyber Attack Threat Trends

Analysis of vulnerabilities in compiled software

without source code

Widespread attacks on Domain Name Systems

(DNS) infrastructure(DNS) infrastructure

Widespread attacks using Network News

Transfer Protocol (NNTP) to distribute attack

"Stealth" and other advanced scanning

techniques

Page 8: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Cyber Attack Threat TrendsCyber Attack Threat Trends

Card Card skimming skimming

Phishing/ pharming Phishing/ pharming

Hacking Hacking

Key loggers Key loggers

Zero Zero day exploits day exploits Zero Zero day exploits day exploits

Social networking Social networking

Mobile devices Mobile devices

Careless Careless employees Malicious employees Malicious insiderinsider

AntiAnti--forensic techniquesforensic techniques

Page 9: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

It is RealIt is Real--GlobalGlobal

With love from With love from RussiaRussia (JP Morgan Chase & Co)(JP Morgan Chase & Co)• 76 million households• 7 million small businesses• Highest level of administrative privilege on more than 90 of the banks

servers

Syrian Electronic Syrian Electronic Army EBayArmy EBay• Personal records of 233 million users compromised

SnowdenSnowdenSnowdenSnowden• 58,000 Sensitive documents stolen• Edward Snowden, an American National Security Agency contractor,

disclosed classified NSA documents to several media outlets, initiating the NSA leaks, which revealed the operational details of several major internet surveillance programs being conducted by the NSA

Federal Reserve Federal Reserve bankbank• Hacktivist group Anonymous retrieved the personal information of 4,000 US

bank executives

Page 10: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

It is RealIt is Real--KenyaKenya

Kenya loses close to Kenya loses close to KKes 2 billion every year due to es 2 billion every year due to cybercrimecybercrime

In 2013 bank customers lost Kes 1.49 billionIn 2013 bank customers lost Kes 1.49 billion

Hacked KDF twitter accountHacked KDF twitter accountHacked KDF twitter accountHacked KDF twitter account

Hacked Deputy president William Hacked Deputy president William RutoRuto twitter accounttwitter account

Hacking of the Integrated Financial Management Hacking of the Integrated Financial Management Information System (IFMIS)Information System (IFMIS)

Ministry of Immigration and registration of persons’ Ministry of Immigration and registration of persons’ websitewebsite

Page 11: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Digital ForensicsDigital Forensics

Page 12: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Digital ForensicsDigital Forensics

Recovery and investigation of material found in

digital devices in relation to computer crime

The main objective is to reconstruct a past eventThe main objective is to reconstruct a past event

Used to support or refute a hypothesis before

criminal or civil courts or internal organization

investigations

Page 13: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Electronic EvidenceElectronic Evidence

Electronic evidence is information and data of investigative value

based on the scope of your investigation that is stored on or

transmitted by an electronic device

Often latent in the same sense as fingerprints or DNA

Can transcend borders with ease

Is fragile and can easily be altered, damaged or destroyed

Can be time sensitive

Page 14: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Digital Forensics LifecycleDigital Forensics Lifecycle

1. Preparation

& Identification

2. Collection

3. Preservation

4. Examination

Analysis

5. Presentation

Page 15: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Where the Fun BeginsWhere the Fun Begins

• Secure the suspect

• Secure the electronic media

• Check the electronic media to see if they are connected to a

network or a phone line

• Photograph the connections, the digital media and its

surroundings, the screen

• Disconnect printer and all peripherals (let it finish if printing

Page 16: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Where the Fun BeginsWhere the Fun Begins

• Place evidence tape over the drives

• Search area around digital media for passwords,

notes, user names, etc

• Seize other disks, CDs, external drives, manuals

• If computer is on turn them off by pulling the

power code from the rear of the computer (for

Windows only)

Page 17: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Where is the EvidenceWhere is the Evidence

• Internet history files

• Temp. Internet files (caches, Cookies)

• Slack/ Unallocated space

• Buddy lists, personal profiles, chat room records• Buddy lists, personal profiles, chat room records

• Settings, folder structure, file names

• File storage data

• Software/ hardware

• File sharing ability

• Emails

Page 18: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Tools DescriptionTools Description

Page 19: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Digital Forensic ToolsDigital Forensic Tools

Computer/Live Forensics– Encase, FTK, Sleuth Kit,

Autopsy

Network Forensics - Wireshark, tcpflow, Network

Miner

Mobile Forensics – Blacklight, Cellebrite Mobile

Forensics, SAFT Mobile

Database Forensics - ACL, Idea and Arbutus

Page 20: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Common Digital Analysis TypesCommon Digital Analysis Types

Media Analysis- From a storage device

Media Management Analysis- Analysis of the

management system used to organize media

File system analysis- analysis of the file system

data inside of a partition or disk

Application Analysis- analysis of data inside of a

file

Page 21: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Common Digital Analysis TypesCommon Digital Analysis Types

Network analysis- analysis of data on a

communications network

OS Analysis- Analysis that examines the

configuration files and output data of the OS to configuration files and output data of the OS to

determine what events may have occurred

Executable Analysis- Analysis of digital objects

that can cause an event to occur

Page 22: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Common Digital Analysis TypesCommon Digital Analysis Types

ImageImage AnalysisAnalysis-- AnalysisAnalysis ofof imagesimages lookinglooking forfor

informationinformation wherewhere picturepicture waswas takentaken andand whowho oror

whatwhat isis inin thethe picturepicture

VideoVideo AnalysisAnalysis-- examinesexamines videovideo forfor identityidentity ofofVideoVideo AnalysisAnalysis-- examinesexamines videovideo forfor identityidentity ofof

objectsobjects inin thethe videovideo andand locationlocation wherewhere itit waswas

shotshot

Page 23: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints
Page 24: ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT ... · ICPAK ANNUAL FORENSIC AUDIT ICPAK ANNUAL FORENSIC AUDIT CONFERENCECONFERENCE ... Often latent in the same sense as fingerprints

Faith Faith Basiye, CFE, CPS(K)Basiye, CFE, CPS(K)

Head of Group Forensic ServicesHead of Group Forensic Services

KCB Bank GroupKCB Bank Group

Email: [email protected]: [email protected]

Cell:+254721240108Cell:+254721240108

Direct line: +254203270848Direct line: +254203270848