Concluding a Forensic Gathering
To conclude a forensic gathering, you should always:
Inform user of the findings
Preserve evidences
Restore the device to its original state
Malware infections
If malware infections were found on a device, the usual Incident Response procedure applies:
Containment
Eradication
Recovery
Lessons learned / evidence retention
Refer to NIST Computer Security Incident Handling Guide for more information.
The incident response procedure changes a lot depending on situations, to give a few examples:
An app that steals the user's contacts were installed and used: decide whether leakage of the user's contacts would put anyone in danger. If not, simply remove the app.
A malware that tries to steal other apps' login cookies: change passwords of all login accounts, logout all sessions, login again. If the malware exploit system protections, factory reset the system and install the latest system updates, if the device hardware is out of date, urge user to switch to a new device.
Last updated