Rise of anti-forensics techniques requires a response

Rise of anti-forensics techniques requires a response

Rise of anti-forensics techniques requires a response

The industry is facing a shortage of digital forensics practitioners able to investigate attacks that use fileless malware and other anti-forensics measures that leave little trace on physical disks.

According to Alissa Torres, founder of Sibertor Forensics and former member of the Mandiant Computer Incident Response Team (MCIRT),

“Attackers know how forensics investigators work and they are becoming increasingly more sophisticated at using methods that leave few traces behind – we are in an arms race where the key difference is training.”

In the last year, Torres has seen a rise in fileless malware that exists only in volatile memory and avoids installation on a target’s file system.

“Five years ago, to see sophisticated anti-analysis and acquisition techniques in the wild was like seeing a unicorn but that is no longer the case. As techniques for detecting trace artefacts on a compromised system have improved, the more sophisticated attackers have adapted quickly.”

Torres estimates that possibly 1 in 4 Digital Forensics and Incident Response (DFIR) professionals has the level of training to successfully analyse the new types of self-defence techniques that include more sophisticated rootkit and anti-memory analysis mechanisms.

“The memory forensics field exploded around 2005 when a lot of the parsing tools started to become available and its use in forensics has been growing ever since,” explains Torres, “An incredible advantage this analysis method has is speed – a skilled expert in memory forensics can discover insights a lot quicker and pick up on information that is missed in traditional disk imaging.”

Although the tools have improved, Torres points out that “…owning a hammer and saw doesn’t make you a carpenter – a deeper understanding of the operating system internals to include memory management allows the examiner to access target data specific to the needs of the case at hand.”

Torres is lead author and instructor of the SANS FOR526: Memory Forensics In-Depth course which she will be teaching at the upcoming annual Digital Forensics and Incident Response (DFIR) Summit and Training event in Prague from the 5th to 17th of October.

The 6 day course provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyse captured memory images. The course uses the most effective freeware and open-source tools in the industry today and provides an in-depth understanding of how these tools work.

Torres will also be presenting “Baselining Memory for Anomaly Detection” alongside a number of leading speakers covering the most innovative DFIR topics at the Summit on Sunday 11th of October.

Click here to find out more about SANS

Leave a Comment

You must be logged in to post a comment.