Email Forensics

22
Email Forensics

description

Email Forensics. Case Study. An email attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker. The message outlined guaranteed “warrants” on the next round of funding for the broker. - PowerPoint PPT Presentation

Transcript of Email Forensics

Page 1: Email Forensics

Email Forensics

Page 2: Email Forensics

Case Study

• An email attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker. The message outlined guaranteed “warrants” on the next round of funding for the broker.

• “Tech.com filed counterclaim and claimed the email was a forgery. Their law firm engaged us to determine the validity of the message.

• We imaged all of the CEO’s computers at his office and his home. Recalled the email server backup tapes from off-site storage.

Page 3: Email Forensics

Case Study

• Searched all hard drives and email server backups for “questioned” message. Search revealed no trace of the message on any of the hard drives or mail spools.

• When the timestamps and message ids were compared with the server logs it was found that the “questioned” message could not have gone through either “Tech.com’s” webmail or mail server at the time indicated by the date/time stamp on the message.

• Based on our analysis Defendants filed motion to image and examine broker’s computers.

Page 4: Email Forensics

Case Study

• Federal Judge issued subpoena and we arrived at broker’s business, but he refused to allow his system to imaged.

• Broker’s lawyer went into State Court, on a companion case, and got Judge to issue an order for a new Court appointed examiner.

• The examination revealed direct proof of the alteration of a valid message’s header to create the “questioned” email.

• What follows are some of the tools and techniques used to document the activity.

Page 5: Email Forensics

Internet Standards (RFCs)

RFC – (Request for Comment)

• Standards for Internet Protocols

RFC 2821

• Simple Mail Transfer Protocol (SMTP) – the objective of SMTP is to transfer mail reliability and efficiently. It is independent of the particular transmission subtype and requires only a reliable ordered data stream channel.

• A mail message may pass through a number of intermediate relay or gateway hosts on it’s path from sender to ultimate recipient. (Supplements RFC 821)

Page 6: Email Forensics

The SMTP Model

Reference: RFC 2821 Section 2.1

Page 7: Email Forensics

Internet Standards (RFCs)

RFC 2822

• Internet Message Format – the purpose of the standard is to establish the format of the messages. (Supplements RFC 822)

3.6.4 Identification Fields

• “Though optional, every message SHOULD have a ‘Message-ID:’ field.” The field “provides a unique message identifier that refers to a particular version of a particular message.” It is intended to be “machine readable and not necessarily meaningful to humans.”

Page 8: Email Forensics

Internet Standards (RFCs)

Message-ID:

• The composition of the message-id is represented by the formula:

<date/time integer.unique_id.domain>

Date/Time Integer

• Can be formatted to display human readable date/time, but is usually in a hexadecimal string. On Unix systems, the string represents the “number of microseconds since midnight, January 1, 1970, Greenwich Mean Time.” (Unix Time – epoch)

Page 9: Email Forensics

Internet Standards (RFCs)

Authentic Message-ID String

[email protected]

To convert to human readable change the hex to decimal and use one of the Unix time scripts or one of the websites with a converter.

3989F5A3 = hexadecimal

965342627 = decimal

Aug 3, 2000 18:43 = Date & Time (+1 hour logs)

Page 10: Email Forensics

Internet Standards (RFCs)

Unique id:

[email protected]

• This is a unique identification assigned in the SMTP process. The domain name of the company is also attached to help ensure global uniqueness.

ESMTP id:

• This is also a unique identification assigned by each intermediate relay or gateway server. This id is also usually in a hexadecimal string that is reset each day. Resulting in an id that can be resolved to a time window on a particular server.

Page 11: Email Forensics

Internet Standards (RFCs)

Suspect Message-ID String

[email protected]

To convert to human readable change the hex to decimal and use one of the Unix time scripts or one of the websites with a converter.

3989E793 = hexadecimal

965339027 = decimal

Aug 3, 2000 17:43 = Date & Time (matches log)

Page 12: Email Forensics

Trace Header 

Return-Path: CEO [email protected] Received: from mail.tech.com (mail.tech.com [201.10.20.152]) by hedgefund.fund.com (8.11.0/8.11.0) ESMTP id e73MfZ331592; Thu, 3 Aug 2000 15:45:31 -0400 Received: from webmail.tech.com (webmail.tech.com [10.27.30.190]) by mail.tech.com (Switch-2.0.1/Switch- 2.0.1) ESMTP id e73MfW903843; Thu, 3 Aug 2000 14:41:32 -0500 Received: from tech.com (ostrich.tech.com [10.27.20.190]) by webmail.tech.com (8.8.8+Sun/8.8.8) with ESMTP id RAA01318; Thu, 3 Aug 2000 14:41:31 -0500 content-class: urn:content-classes:message Subject: Warrants on $25 Million Funding Date: Thu, 3 Aug 2000 14:43:47 -0500 MIME-Version: 1.0 Content-Type: application/ms-tnef; name="winmail.dat" Content-Transfer-Encoding: binary Message-ID: <[email protected]> X-MS-Has-Attach: X-MS-TNEF-Correlator: <[email protected]> Thread-Topic: Warrants on $25 Million Funding Thread-Index: AcHatCZUSkaLe0ajEdaelQACpYcy8A== From: "CEO [email protected]" <[email protected] > To: "Bad_Guy_Broker" <[email protected]>

Page 13: Email Forensics

Server Logs

[email protected]

Typical logs kept for a week or less and then new log spawned.

syslog. = 7/30 – 8/4 (current period) syslog.0 = 7/23 – 7/30syslog.1 = 7/16 – 7/23syslog.2 = 7/09 – 7/16syslog.3 = 7/02 – 7/09syslog.4 = 6/25 – 7/02syslog.5 = 6/18 – 6/25syslog.6 = 6/11 – 6/18syslog.7 = 6/04 – 6/11

Page 14: Email Forensics

Server Logs

[email protected]

• Analysis of the webmail server logs revealed several issues regarding the validity of the suspect message.

• Matching trace header timestamps and ESMTP ids revealed that RAA01318 was issued at 17:41:31 to the authentic message.

• Comparing the 14:41:31 timestamp of the suspect message with the log revealed the server was assigning ESMTP ids beginning with “OAA” not “RRA” as represented in the header.

Page 15: Email Forensics

Server Logs

[email protected]

• Analysis of the mail server logs confirmed that the suspect message was not authentic.

• Matching trace header timestamps and ESMTP ids revealed that the authentic Message-ID was logged at 17:41:32 and assigned ESMTP id e73MfW903843 then it was sent to the [email protected] server and it was assigned a new ESMTP id e73MfZ331592.

• Comparing the 14:41:32 timestamp of the suspect message with the log revealed the were no messages for over an hour during that time frame.

Page 16: Email Forensics
Page 17: Email Forensics

Outlook Message Properties

Page 18: Email Forensics

Default Outlook Fields

Page 19: Email Forensics

Outlook Client Fields

Page 20: Email Forensics

Notes Message Properties

Page 21: Email Forensics

Email Spoofs

Received: from tht.com (wfarwell.ne.mediaone.net [24.128.21.184])by chmls06.mediaone.net (8.11.1/8.11.1) with ESMTP id f1RC2GK11063; Tue, 27 Feb 2001 07:02:16 -0500 (EST) From: Robert Lovett [[email protected]] Sent: Thursday, August 03, 2000 8:03 AM To: Bill Farwell [[email protected]]; [email protected] Subject: Email Spoof Bob, This is one way to spoof email. Bill ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ William L. Farwell, CFE, SCERS Senior Manager Computer Forensic Specialist Deloitte & Touche LLP Forensic Investigative Services 200 Berkeley Street Boston, MA 02116 617.437.3956 Voice 617.437.5956 Direct Fax 617.437.3849 Lab 617.839.1998 Mobile mailto:[email protected] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Page 22: Email Forensics

William L. Farwell, CFE, SCERS

Deloitte & Touche, LLPForensic Investigative Services200 Berkeley StreetBoston, MA 02116

617.437.3956

[email protected]

Questions?