September 8, 2015 By Pamela Cobb 3 min read

Remember “The Myth of the Obvious Malware,” and how successful malware is sneaky and engineered to be well-hidden, like a subtle email with an obfuscated link to a malware download? Unsurprisingly, this sneakiness means it is hard to detect without sophisticated analytics and robust forensics capabilities. This is no one-hour story arc as we’ve all seen in television crime dramas; there are no transparent touch screens and witty one-liners before the first commercial break. I guess you could say our best hope is that the cybercriminals … *puts on sunglasses*… haven’t gone phishing.

The Forensics Evidence Doesn’t Lie

Last year, the Ponemon Institute, in conjunction with IBM Security, released a market study on network forensics investigations that broke down the forensics process into five major steps: detection, escalation, containment, recovery and post-mortem. Unsurprisingly, the detection and recovery phases take up the most time in the investigation — a combined 70 percent of the total — since these phases involve the bulk of the heavy lifting in the investigation. Detection, at 35 percent of the total time, is similar to finding the body and all the evidence. Although on television the body is laid out in the first three-minute opening scene, in real life, security forensics investigators are likely spending a good bit of time trying to figure out if a breach or attack actually happened.

In fact, Ponemon reported that only 31 percent of the time did breaches turn out to be real attacks. What a horrible show that would be: You expect to have a crime to solve each week, but only every third episode produced a body and the rest was just forensics investigators drinking coffee while tediously sifting through all possible evidence.

Once the figurative body is found in the network, investigators need to trace back what actually happened. There are a number of tools available to help with this, and many organizations use packet captures (PCAP) to aid in the investigations — 69 percent, in fact. The trouble is that this evidence is nearly as fleeting as the villain of the week since full packet capture is only stored on average for 10 days. But more on that later.

Results May Vary

If a toxicology test is ordered on TV, you can bet the results will be in by the next commercial break. The results are delivered wordlessly to the lead investigator with a meaningful stare and some eyebrow twitches as the analyst withholds the name from the audience for maximum suspense. Frankly, if any security professional attempted to name an attacker only through stares and eyebrow twitches, well… Maybe that’s how we get cybercriminal names like Ch0$3n0ne.

In real life, the Ponemon study shows that, from detection to containment for a breach like the one cited above, the average time to complete a forensics investigation is nearly a full week. It’s even longer for an insider attack. Having those 10 days of packet captures from before is plenty of time, then, to completely solve the crime.

A different Ponemon study, though, shows that malware can stay undetected on the network for up to 225 days. Then that initial attack vector is long gone from the 10 days of PCAP storage records. The trick is to detect the crime before that first commercial break — or, in the real world, within days of it happening.

The Twist Ending

The evidence was right in front of you the entire time: Security intelligence is the key. Detection capabilities that gather all the evidence in logs and network flows and focus in on anomalous behavior are necessary to figure out that an attack has occurred.

To then decipher the evidence, you can’t rely on the bad guys writing their malware in red while the good, regular code is in green. A good incident forensics solution can retrace the step-by-step actions of attackers and reconstruct raw network data while seamlessly integrating with a security intelligence platform and significantly shortening the time to investigate the incident to days instead of weeks.

Although a forensics solution doesn’t provide built-in car chases, dramatic underwater rescues or the opportunity to rough up a perp in interrogation, it does provide a solid — and fast — foundation to do forensics analysis, and it would look pretty cool on a transparent touch screen, too.

Read the complete Network Forensic Investigations Market Study from Ponemon Institute

More from Intelligence & Analytics

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Accelerating security outcomes with a cloud-native SIEM

5 min read - As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security programs must evolve to secure modern IT environments against fast-evolving threats with constrained resources. This will require rethinking traditional security strategies and focusing investments on capabilities like cloud security, AI-powered defense and skills development. The path forward calls on security teams to be agile, innovative and strategic amidst the changes in technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today