Linux Malware Incident Response

August 1, 2013
linux book security

Two days back I started reading “Linux Malware Incident Response“. It comprises of 134 pages which is perfect if you’re looking for some quick reading.

The author introduces the topic by going in depth about malware incidents & investigation. He breaks down the same as 5 phases :

  1. Forensic preservation and examination of volatile data
  2. Examination of memory
  3. Forensic analysis: examination of hard drives
  4. File profiling of an unknown file
  5. Dynamic and static analysis of a malware specimen

Thus the author elaborates on these 5 sub-topics within the book.

The introduction however can appear a bit bulky with too much reading. Concepts are repetitively described. People with technical background might get bored with the first few pages. Just bear with the initial theories as the rest of the book will be a pleasure once the introduction chapter is over.

Indeed! The rest of the book contains a load amount of information that will benefit many System Admins out there. While reading I recalled my days at Linkbynet when I dealt with malware intrusion. Those were some fun moments. Priority was to get customer’s application up & running again and after I would investigate & report how the intrusion happened.

The author does a great job by providing command examples and inline references that prompts for additional reading.

There’s one particular thing that captured my mind; it’s about taking snapshot of the physical memory and analyzing the data. It’s a great way to investigate since a lot of traces could still be left within the memory space after the intrusion. Apart from third-party tools the author emphasizes a lot on utilities that already come built-in with most Linux distributions. These may be tools that System Admins use everyday. Yet the author shows how these tools can be used to extract precise information and crunch the same for analysis.

It may not be a complete manual but this book will be useful to people beginning with Linux malware incident resolution & investigation.

Authors: Cameron H. Malin, Eoghan Casey and James M. Aquilina Publisher: Elsevier / Syngress

City Council of Barcelona switches from Microsoft Windows to Linux

February 11, 2018
linux ubuntu microsoft open source data protection

linux.com website compromised?

December 7, 2017
linux wordpress security

Apple MacOS root access flaw

November 29, 2017
apple macos security