12.07.2015 Views

What is new in CHFI v8 Module - SSE

What is new in CHFI v8 Module - SSE

What is new in CHFI v8 Module - SSE

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Forensics Case – Studies # 2Case: Stroz Friedberg Pro Bono CaseStudySummary: F<strong>in</strong>d out how Stroz Friedberg technical experts forensically imaged andanalyzed the computer that had generated the tampered wire transfer.The <strong>in</strong>trusion occurred when a staff accountant, while work<strong>in</strong>g on her officecomputer, unknow<strong>in</strong>gly opened a spear ph<strong>is</strong>h<strong>in</strong>g e-mail from her personalwebmail and clicked on a l<strong>in</strong>k purported to be a United Parcel Services’ track<strong>in</strong>greceipt. Alas, her work computer was <strong>in</strong>stantly contam<strong>in</strong>ated with a powerfulmalware known as “man <strong>in</strong> the browser” attack.The charity’s bank immediately alerted the goodwill organization that it might bethe victim of malware. Unfortunately, the charity’s IT department did not have theproper suite of remediation tools, nor did it <strong>in</strong>stitute one of the most criticalprocesses of a cyber <strong>in</strong>cident response plan—d<strong>is</strong>connect a potentially <strong>in</strong>fectedmach<strong>in</strong>e from the network (with its power on) before attempt<strong>in</strong>g to conduct a fulland effective remediation.The money was irretrievably lostTo f<strong>in</strong>d out how the case was remediated by Stroz Friedberg please v<strong>is</strong>ithttp://www.strozfriedberg.com/casestudies/xprExperienceDetail1.aspx?xpST=ExperienceDetail&experience=7410Copyright © by EC-CouncilAll Rights Reserved. Reproduction <strong>is</strong> Strictly Prohibited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!