Unique and Exclusive Training
In addition to Cyber Behavioral Profiling services and solutions, Modus Cyberandi offers exclusive training customized for your organizations needs.
With an existing catalog of cutting-edge trainings developed for assessing and understanding threat adversaries or curated curriculum and class modules tailored to your needs, Modus Cyberandi offers a wide array of training solutions to enhance your teams’ knowledge base.
Resource Library
Modus Cyberandi founder and lead Behavioral Profiler, Cameron Malin is both a practitioner and researcher in cyber adversary behavior, tactics and deception strategies. Cameron’s books and other scholarly works include malware forensics, cyber deception and digital behavior criminalistics. You can find links to his Google Scholar Page, Amazon Author Page, and book chapter in the International Threat Assessment Handbook here.
Books
Synthetic Media, Deep Fakes, and Cyber Deception: Attacks, Analysis, and Defenses [Publication in April, 2024]
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.
The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.
Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
- Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
- Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
- Dissects the underpinnings and elements of deception narratives
- Examines group dynamics and deception factors in cyber attacker underground markets
- Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies
- Explores the deception strategies used in today’s threat landscape—phishing, watering hole, scareware and ransomware attacks
- Gives unprecedented insight into deceptive Internet video communications
- Delves into the history and deception pathways of nation-state and cyber terrorism attackers
- Provides unique insight into honeypot technologies and strategies
Explores the future of cyber deception
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution.
This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program.
This book will appeal to computer forensic investigators, analysts, and specialists.
• A compendium of on-the-job tasks and checklists
• Specific for Linux-based systems in which new malware is developed every day
• Authors are world-renowned leaders in investigating and analyzing malicious code
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code.
The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter.
This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code.
Winner of Best Book Bejtlich read in 2008!
http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader
First book to detail how to perform "live forensic" techniques on malicous code
In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter
“Digital Behavioral Criminalistics to Elucidate the Cyber Pathway to Intended Violence” in J. Reid Meloy, and Jens Hoffmann (eds) International Handbook of Threat Assessment, 2 edn. Oxford University Press.
Online Chapter Content: Oxford University Press
https://academic.oup.com/book/30016/chapter/255634518
This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program.
This field guide is intended for computer forensic investigators, analysts, and specialists.
• A condensed hand-held guide complete with on-the-job tasks and checklists
• Specific for Windows-based systems, the largest running OS in the world
• Authors are world-renowned leaders in investigating and analyzing malicious code