A round-up of this week’s digital forensics news and views:
File Timestamps for NTFS on macOS using Mountly
This blog post will examine the NTFS file system being used on macOS with the Mounty driver, and the conditions that cause timestamps to change based on different file operations while using a macOS device…
Europol experts didn’t complete assigned tasks, magistrate says in Daphne case
Computer forensics experts who extracted data from Daphne Caruana Galizia’s phone and blog did not complete the tasks they were assigned in 2017, a magistrate said on Tuesday…
Volatility3 : Alternate Data Stream Scan
The Master File Table (MFT) is the core metadata structure for the New Technology File System (NTFS). This table can be seen as a database that contains every information needed to describe all the files…
Ransomware group dismantled in Ukraine in a major international operation supported by Eurojust and Europol
Judicial and law enforcement authorities from seven different countries have joined forces in an action against a criminal network responsible for significant ransomware attacks across the world…
Develop digital forensic infrastructure to deal with Dark Web: NHRC chief
National Human Rights Commission (NHRC) chairperson Justice Arun Kumar Mishra on Sunday expressed concern about the Dark Web and the threat it poses to society, adding that there is a need to develop a digital forensic infrastructure to deal with it…
Detecting RMM tools using Microsoft Defender for Endpoint
It’s no secret that Remote Monitoring and Management (RMM) software is being used by Threat Actors (TAs) for lateral movement and to establish command and control (C2)…
The Amped FIVE Certified Examiner (AFCE)
Si and Desi interview Emi Polito from Amped about their new certification called Amped Five Certified Examiner (AFCE). They discuss the exam requirements, format, timeline for certification, and Amped’s future plans…
How India’s Police Is Using Metadata
When you run a YouTube channel through a software like Social Network Analytics, you will get thousands of lines of information, which will be your metadata…
ETW internals for security research and forensics
Why has Event Tracing for Windows (ETW) become so pivotal for endpoint detection and response (EDR) solutions in Windows 10 and 11?…
Read More (Trail of Bits Blog)
Forensic Duel: Exploring Deleted WhatsApp Messages—iOS vs Android
Deleted data is a crucial aspect of digital evidence. While suspects’ chats and files provide valuable insights, finding out what they attempted to hide can be pivotal in solving a case…