Cyber Attribution and Digital Evidence Analysis

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

A comprehensive set of 40 vocabulary flashcards covering key concepts, terms, and definitions related to cyber attribution, digital evidence, and cryptocurrency laundering.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Cyber Attribution

The process of tracing online criminal activity back to a real human suspect using digital and physical evidence.

2
New cards

Pedigree Diagram

A step-by-step map showing how evidence links online activity to digital identifiers to a real person.

3
New cards

Isolate Criminal Conduct

Step 1 in cyber attribution; identifying the illegal online act (hacking, phishing, malware, data theft).

4
New cards

Directly-Linked Cyber Pedigree

Step 2; evidence directly tied to criminal activity, e.g., IP address, email, malware hash.

5
New cards

Follow-On Pedigree

Step 3; indirect digital links such as proxies, VPNs, burner accounts, and secondary servers.

6
New cards

Link to a Suspect

Step 4; connecting digital trails to a real identity using ISP data, subpoenas, and account info.

7
New cards

Summarize & Articulate Proof

Step 6; writing a detailed summary showing how evidence proves suspect’s involvement.

8
New cards

Digital Evidence

Information stored or transmitted in digital form that can help in investigations.

9
New cards

Chain of Custody

Documentation proving who handled evidence at every step of the investigation.

10
New cards

Phishing

Mass deceptive emails designed to trick users into clicking malicious links.

11
New cards

Spear-Phishing

Targeted phishing aimed at specific individuals, such as executives or employees.

12
New cards

Remote Access Trojan (RAT)

Malware that gives attackers remote control over a device.

13
New cards

Lateral Movement

The movement of attackers through a network after the initial compromise.

14
New cards

CVE

Common Vulnerabilities and Exposures, a database of known security flaws.

15
New cards

Mimikatz

A credential-harvesting tool that extracts passwords and tokens from RAM.

16
New cards

ISP

Internet Service Provider; offers subscriber info tied to an IP address.

17
New cards

Subpoena

A legal document used to force ISPs or others to provide user data for investigations.

18
New cards

Spectrum/Charter Communication Subpoena

Served to corporate legal departments for law enforcement data requests.

19
New cards

Email Used in Attack

financialguard@gmail.com (used for spear-phishing).

20
New cards

Initial Compromised Executive

JNelson@financialguard.com (opened the malicious PDF leading to compromise).

21
New cards

IP Chain

A sequence of IP addresses traced back to a specific location.

22
New cards

Homeowner/Resident

Also referred to in the quiz; describes the individual arrested at the traced IP location.

23
New cards

Money Laundering

The process of making illegal money appear legitimate.

24
New cards

Structuring (Smurfing)

Splitting large transactions into smaller ones to avoid bank reporting.

25
New cards

Shell Company

A fake business used to hide or move illicit funds.

26
New cards

Trade-Based Laundering

Over/under-invoicing goods to move money across borders.

27
New cards

Layering

Complex transfers designed to hide the source of illegal funds.

28
New cards

Cash-Intensive Businesses

Businesses like restaurants or casinos that mix dirty cash with legitimate income.

29
New cards

Real Estate Laundering

Using property transactions to clean illicit money.

30
New cards

Cryptocurrency Laundering

Using crypto transactions to hide money trails.

31
New cards

Mixing Services (Tumblers)

Services that blend cryptocurrency to break blockchain traceability.

32
New cards

Darknet Markets

Online black markets where illegal goods are bought with cryptocurrency.

33
New cards

Ransomware Payments

Payments made by victims in cryptocurrency to attackers.

34
New cards

Prepaid Cards / Virtual Currency

Anonymously moving funds easily through digital channels.

35
New cards

Digital Asset Exchanges

Platforms that can be manipulated for wash trading and laundering.

36
New cards

Gaming Platforms / Virtual Assets

Criminals convert dirty money into game currency or items and resell for clean cash.

37
New cards

Bitcoin (BTC)

A traceable blockchain cryptocurrency that is pseudo-anonymous.

38
New cards

Ethereum (ETH)

A traceable blockchain that supports smart contracts and has high forensic visibility.

39
New cards

Monero (XMR)

A fully anonymous privacy coin with untraceable transactions.

40
New cards

Zcash (ZEC)

Offers shielded transactions for enhanced anonymity.

41
New cards

Dash (DASH)

A cryptocurrency that provides an optional privacy feature called 'PrivateSend'.

42
New cards

Stablecoins (USDT/USDC)

Cryptocurrencies that retain value; often used in fraud schemes.

43
New cards

OSINT (Open-Source Intelligence)

Using public information like WHOIS, social media, and public records for investigations.

44
New cards

IP Lookup Tools

Tools like IPinfo.io and Whois.domaintools used to find information about IP addresses.

45
New cards

Email Header Analysis

Tracing the sending server and originating IP through email headers.

46
New cards

Malware Analysis Tools

Tools like VirusTotal and Cuckoo Sandbox used for analyzing malware.

47
New cards

Blockchain Analysis Tools

Tools like Chainalysis and CipherTrace for tracing cryptocurrency laundering.