SlideShare a Scribd company logo
1 of 5
Shawn Baker
Cyber Crime Projects
M57.biz Lab
White Hat H4ck3rz
Security Consulting Firm
Executive Summary
White Hat H4ck3rz was contracted by M57.biz to investigatea suspected caseof Corporate Espionage. An image
of the client’s hard drivewas loaded into FTK Imager. After reviewingrelevant company E-mails and the
spreadsheet in question, we have come to the conclusion thatan originatinge-mail comingfrom Alison,(The
President of M57.Biz) to Jean, (the CFO of M57.Biz) requesting sensitivecompany information such as Name, SSN,
Position,and Salary of currentemployees and intended new hires.
User “Jean”has shownevidence of receivingnumerousspamemails,whichinturnstartedsending
spam to“Alison.” Thisisa classicexample of whatisknownasa computerthat isinfectedwithAdware.
Consequently,openingone of these e-mailsandclickingonthe linkwill infectanycomputersthatwere
targetedduringthe forwardingprocess.
We believe that Alison opened one of these emails and was infected, before askingJean for the company data.
This is an e-mail originatingfromAlison July 20th,askingJean for the company data. Jean replied with a
confirmation of the data included in a MS Excel document.
The excel document was actually created by Alison on 06/12/2008,and then updated and saved by Jean on
07/20/2008.
In Alison’s final reply you can see that there is a separate e-mail address of “tuckgorge@gmail.com” followingher
company e-mail. This is evidence of what is known as “e-mail spoofing”. A malicious3rd party disguised as Alison,
intercepted these transmissionsafter recognizingthe opportunity to sell this confidential data to one of M57.biz’s
competitors.
Company employees “Bob” and “Carol” were involved in attempting to uncover the incident,but we believe they
had no involvement in any illegal activity. Although they did not intentionally nor willingly participatein the
commission of this crime,the faultlies with Jean and Alison for improper storage and transmission of sensitive
company data.

More Related Content

What's hot

PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
Dawn Hicks
 
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and PhishingO365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
NCCOMMS
 

What's hot (12)

Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Phishing
PhishingPhishing
Phishing
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Presentation1
Presentation1Presentation1
Presentation1
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and PhishingO365Engage17 - Protecting your Users Against Email Spoofing and Phishing
O365Engage17 - Protecting your Users Against Email Spoofing and Phishing
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 

Cyber Crime Poject

  • 1. Shawn Baker Cyber Crime Projects M57.biz Lab White Hat H4ck3rz Security Consulting Firm
  • 2. Executive Summary White Hat H4ck3rz was contracted by M57.biz to investigatea suspected caseof Corporate Espionage. An image of the client’s hard drivewas loaded into FTK Imager. After reviewingrelevant company E-mails and the spreadsheet in question, we have come to the conclusion thatan originatinge-mail comingfrom Alison,(The President of M57.Biz) to Jean, (the CFO of M57.Biz) requesting sensitivecompany information such as Name, SSN, Position,and Salary of currentemployees and intended new hires.
  • 3. User “Jean”has shownevidence of receivingnumerousspamemails,whichinturnstartedsending spam to“Alison.” Thisisa classicexample of whatisknownasa computerthat isinfectedwithAdware. Consequently,openingone of these e-mailsandclickingonthe linkwill infectanycomputersthatwere targetedduringthe forwardingprocess. We believe that Alison opened one of these emails and was infected, before askingJean for the company data.
  • 4. This is an e-mail originatingfromAlison July 20th,askingJean for the company data. Jean replied with a confirmation of the data included in a MS Excel document. The excel document was actually created by Alison on 06/12/2008,and then updated and saved by Jean on 07/20/2008.
  • 5. In Alison’s final reply you can see that there is a separate e-mail address of “tuckgorge@gmail.com” followingher company e-mail. This is evidence of what is known as “e-mail spoofing”. A malicious3rd party disguised as Alison, intercepted these transmissionsafter recognizingthe opportunity to sell this confidential data to one of M57.biz’s competitors. Company employees “Bob” and “Carol” were involved in attempting to uncover the incident,but we believe they had no involvement in any illegal activity. Although they did not intentionally nor willingly participatein the commission of this crime,the faultlies with Jean and Alison for improper storage and transmission of sensitive company data.