Preview

Who Bait The Hook?: A Case Study

Powerful Essays
Open Document
Open Document
1885 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Who Bait The Hook?: A Case Study
Who bait the hook?

Based on artifacts found on the suspect’s hard drive, it not possible to determine the attacker’s identity, but then I can think of at least three theoretical hypotheses:
First Hypothesis the first hypothesis is based on the email number 20 from Jean’s Inbox sent by Alison on the 6th July 2008, 20:25:14 with the Subject: By the way… : where Alison wrote “Looks like the woman we turned down for the job…” It’s possible that the woman mentioned in the email may have felt, somehow, unfairly turned down and tried to get back at Alison for turning her down.

The Second Hypothesis
The second hypothesis is based on the email 210 sent by Alex on the 20th July 00:43:48 with the Subject: Programmers where Alex wrote “Have you
…show more content…
The fact that the email(s) sent by Alex are sent from within the company servers/network supports the second hypothesis. It doesn’t answer our question, but it sure helps. With the second hypothesis we assume the attack is someone who either works or is supposed to start working for M57.biz. From the content of the email we have three names that we need to look at. After looking at the emails sent and received by Jean, I was unable to find any artifacts belonging or linking Alice to Jean’s email account. There are however three email sent by Bob and two emails sent by Carol to Jean the day after Jean emailed the spreadsheet to tuckgorge@gmail.com. On the 21st July 2008, 00:53 Bob sends an email to Jean asking if she knowns anything about his social security number being posted on the Internet. This email raises no suspicion and a look at the meta-data doesn’t show anything suspicious per se.

As we can see the email was sent through M57.biz WebMail Server using squirrelmail a webmail client. It could have been easily dismissed if it wasn’t for the fact that squirrelmail requires a server with PHP. Maybe I am overlooking this… Since there isn’t a conclusive answer as in who is behind the attack we can explore the possibilities using the artifiacts found in the suspects hard drive. In the email 210 from Jean’s Inbox when the attacker requests the information(spreadsheet) from Jean we know that the email was sent through an apache server as shown

You May Also Find These Documents Helpful

  • Satisfactory Essays

    |This e-mail is in reference to the two employees who are going to be terminated Friday. We have determined that they are Nicole Stone|…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Network reconnaissance was conducted against the address space provided by [Organization] with the understanding that this space would be considered the scope of this engagement. It was determined that the organization maintains a minimal external presence, consisting of an external web site and a hosted mail service. This constituted a small attack…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Good Essays

    As for the identity of the terrorist, it is not coming anytime soon in the coming episodes. And it is very likely that…

    • 290 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within the LAN. The SMB server utilizes an application layer network protocol, which can run atop the session layer. It provides shared access to files, printers, serial ports, and network nodes (workstations, laptops, desktops, etc.) and provides a client/server relationship throughout the network. This means that every domain layer of the IT Infrastructure…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Mr. Bronk utilized various online email service providers such as Gmail, Hotmail, and Yahoo. The victims each had respective accounts with these email service providers which were overtaken by Mr. Bronk, using the methods described above. Mr. Bronk also used Microsoft Office Outlook in the commission of his crimes.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Mail may have confidential information; it may include personal information about employees or contain confidential business information. When we receive mail or parcels from unknown addresses which may be suspicious, security procedures have to be followed and reported to the office manager. All mails and packages have to be thoroughly checked to see if it has been opened or tampered with. When handling mails and packages you must also look out for any suspicious features. Therefore, strict security procedures have to be followed at all times.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fre 1001 Case Study

    • 643 Words
    • 3 Pages

    Can the evidence of the alleged e-mail and its contents be proven even though Mrs. Steinman says that her computer was…

    • 643 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ambiguity demonstrates how it can be difficult to determine the line between illegal and legal activity. This is shown through the regulation of e-waste. E-waste is legal however the dumping of e-waste over a certain quota becomes illegal (Elliott 2012). Both legal and illegal pollutants cause environmental harm, however only illegal pollutants are considered a crime. The ambiguous nature of identifying legal or illegal waste causes challenges in controlling environmental crimes.…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking Into Harvard

    • 589 Words
    • 3 Pages

    Reasons that may have caused the applicants to hack into the system to acquire their results could be because they were too impatient to wait for the official announcement that is weeks away. So out of curiosity, they clicked the link that the original anonymous hacker provided on some websites. The…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Taking Advantage of People

    • 2473 Words
    • 10 Pages

    Throughout history, religions have been created and still today continue to be created. Most people have a common faith that they have inherited from their ancestors; they have and always will practice their religion as long as it seems to be in their favor. Some people go to church to cleanse their conscious of the naughty things they’ve been doing and fear the wrath of their god. Others may have a lot of things going their way and they want to thank their faith in religion for these blessings. Other people might be in a situation where life has handed them hardly a morsel of luck or faith; they may also blame a god for their misfortune or stop believing in religion altogether. These people would be in a prime condition to find faith. Finding faith is a reason why religious studies and practices are so intricately different. People take what they have been told and they mix these views with their own personal life experiences to create an ideal trust in someone or something. Sometimes people can believe in someone and take their words as the words of god. To do this they have to trust and hold such a person in the highest respect. In return the person who is in supposed contact with God must value this trust and use it to spread their beliefs. This relationship usually works out quite nicely for the people in such a bond. They find a trust in each other and each gain the ability to use one another.…

    • 2473 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Bells hooks 'Marginality as a Site of Resistance',is an engaging and powerful comment on the solicitude for all those colonised on the perimeter of society.To identify as, but not be defined as, the marginalised. To use this site as an advance point to gain a formative viewpoint and destabilize the deep structures of power and cultural domination. Mona Hatoums work deals with identity in the context of displacement, gender and memory. Through Hatoums artworks 'Recollection' (1995) and Grater Divide (2002) hooks argument will be investigated further in relation to both gender and identity.…

    • 1753 Words
    • 8 Pages
    Good Essays

Related Topics