blank
  • About
    • Our Story
  • Services
    • DFIR
    • GRC-A
    • Offensive Security
    • Restoration
    • Security Engineering
    • Security Operations Center
  • Industries
    • Healthcare
    • Higher Education
    • Retail
    • Financial Services
    • Manufacturing
    • Government & Non-Profit
  • News & Events
  • Best Practices
  • Newsletter
  • Careers
  • Blog
  • Contact
Shape
Shape

Working with Law Enforcement During a Breach

Working with Law Enforcement During a Breach

January 5, 2021

We have a team of Digital Forensics and Incident Response (DFIR) experts here at Lodestone working daily with organizations that have fallen victim to a cyber attack. During our investigation, clients ask a lot of common questions. In this post, I am sharing some of the common questions about working with authorities and our general recommendations.

Should we work with any law enforcement agencies?

We encourage our clients to work with local agents and share any information that you feel comfortable sharing. The typical agency that responds to cyber crime, including extortion events like ransomware, is the Federal Bureau of Investigation (FBI).  Circumstances of the attack or regulations governing your organization might dictate otherwise. Ideally, you would reach out prior to a data breach and make contact with a local agent as a part of building your Incident Response Plan (IRP) and include that contact information in the IRP document.

Do you share our information with law enforcement?

Without explicit permission from you, we do not share your information with anyone. We engage under complete confidentiality which frequently includes attorney client privilege. The team at Lodestone does contribute de-identified statistics and observed tactics, techniques, and practices (TTP) to various cybersecurity industry information exchanges and sharing groups to help combat cybercrime.  Law enforcement agencies are part of these groups, as well. We take every precaution to ensure any information we share is not identifiable or attributable to persons or organizations.

Can I use the FBI instead of a commercial DFIR team?

While the FBI is an investigative agency, they do not have the resources to help everyone perform exhaustive forensic investigations and determine root cause. They also don’t have resources to help remediate the damage done, repair the security flaws that allowed the attack or restore your organization to normal operations. FBI agents will likely refer you to a private sector DFIR firm like Lodestone to conduct the investigation and ask you to share back information that you learn.

Does it make a difference? Do they catch the criminals?

Yes! While not every criminal will be discovered and arrested, they gather as much information as they can, as it can and does lead to identifying and apprehending the criminals. More importantly, the FBI’s database of TTPs and other threat intelligence has become top-notch over the last few years.  That vast improvement is significantly fueled by contributions from the private sector.  Many of us Lodestone can proudly say that we have helped to identify criminals that the FBI has successfully arrested.

What information do they want?

Taken from a recent ransomware alert, here are some pieces that the FBI generally asks for. Keep in mind, you don’t have to share everything. Even just one item could be a piece they are missing from other cases.

  • Recovered executable file
  • Complete phishing email file with headers
  • Live memory (RAM) capture
  • Images of infected systems
  • Malware samples
  • Network and Host Based Log files
  • Email addresses of the attackers
  • A copy of the ransom note
  • Ransom amount and if the ransom was paid
  • Bitcoin wallets used by the attackers
  • Bitcoin wallets used to pay the ransom (if applicable)
  • Tor sites used to contact the attackers
  • Names of any other malware identified on your system
  • Copies of any communications with attackers
  • Document use of domains for C2
  • Identification of website or forum where data was leaked

In general, we encourage you to work with privacy counsel to ensure you are making the best decisions when sharing any information with anyone. If you don’t have any established relationships with privacy counsel, we have some great partners that we love to recommend.

Feel free to reach out to us with any questions you have about incident response, data breach readiness or ransomware.

FPO pexels pixabay 270220

SEE MORE INSIGHTS

Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Seven: Actions on Objectives
By: Danielle Wallace and Adam Harrison Let’s face it – we’re spending most of…
Read More
iStock 1208624778
White Rabbit Continued: Sardonic and F5
By Jason Daza Key Contributors: Manoj Khatiwada, Paul Brunney, Michael Wirtz, and Group-IB In…
Read More

Connect With Us

320 East Main Street
Lewisville, TX 75057

203.307.4984

blank

An elite cyber security force

If you have a breach contact us at info@lodestone.com

Linkedin-in Twitter
  • About
  • Services
  • Industries
  • News & Events
  • Best Practices
  • Newsletter
  • Blog
  • Careers
  • Contact
  • Privacy Policy

©2023 Lodestone
Lodestone Security is a wholly owned subsidiary of Beazley plc. Lodestone provides computer security and cyber security consulting services. Lodestone does not provide insurance services and client information obtained by Lodestone is not shared with Beazley claims or underwriting. Likewise, client information obtained by Beazley claims or underwriting is not shared with Lodestone.