How Miscreants Hide From Browser Forensics

Scammers, intruders and other miscreants often aim to conceal their actions from forensic investigators. When analyzing an IT support scam, we had a story of a person posing as the help desk technician. He brought up a web page on the victim’s system to present payment form, so the person would supply contact and credit card details. He did this in a surprising manner, designed to conceal the destination URL.

Hardly a day goes by without me hearing the phrase ‘Threat Intelligence’ being used in the context of big budget enterprise protection, but recently we have been giving some thought to what this means to the home user and small business.

Most computers have (or at least, should have!) up-to-date antivirus software installed which provides a certain degree of protection and gives insight on whether a particular file, or set or circumstances, are suspicious according to vendor X (using signatures, reputation lookup and several other methods), but we’re sure there is more that the open source cyber security community can do to protect itself by leveraging fantastic free resources, such as the VirusTotal Public API

For more Information, go to our website,   www.ChairesSecurityContractorsandInvestigations.com or contact us   Todd@ChairesSCI.com or info@ChairesSCI.com

Published by

ChairesSCI

Advanced Security Training •Licensed Security Guard Instructor (2014) •NRA Certified Handgun, Shotgun, and Rifle Instructor (2013) •Counterterrorism Tactics, Security Solutions International (2011) •Large Vehicle Bomb Investigations, FBI (2010) •Radiological Fundamentals, Dept of Health (2010) •Critical Infrastructure, Texas A&M University (2010) •All-Hazards Preparedness, Texas A&M University (2010) •Hathcock Sniper School, Meridian MS (2009) •Dignitary Protection, Leon County Sheriff’s Office (2007) •FEMA Incident Command System, FEMA (2007) •Prevention and Response to Suicide Bombings, New Mexico Tech (2006) Advanced Investigative Training •Police Precision Marksman, TCC (2008) •Sexual Assault Investigations and DNA Collection and Utilization, Critical Interaction Associates (2005) •Child Sexual Abuse Investigation, CPT (2005) •Homicide Investigation, The Southern Police Institute (2003) •Certified K9 Handler, US Police Canine Association (2000) •Interview and Interrogation, Multi-jurisdictional Counter-drug Task Force (1999) •Highway Interdiction, Florida Highway Patrol (1999) •Rave and Designer Drugs, FDLE (1999)

2 thoughts on “How Miscreants Hide From Browser Forensics”

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>