Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

11/10/2009
10:33 AM
Robert Graham
Robert Graham
Commentary
50%
50%

Partially Spilled COFEE

It turns out the version of COFEE (Computer Online Forensic Evidence Extractor) posted to BitTorrent sites is incomplete: It contains only 45 commands, whereas Microsoft claims the tool executes more than 150 commands. It grabs neither browser history nor password hashes. It runs only built-in Windows commands, sysinternals tools, and resource kit tools.

It turns out the version of COFEE (Computer Online Forensic Evidence Extractor) posted to BitTorrent sites is incomplete: It contains only 45 commands, whereas Microsoft claims the tool executes more than 150 commands. It grabs neither browser history nor password hashes. It runs only built-in Windows commands, sysinternals tools, and resource kit tools.The COFEE tool was published by some people in Microsoft for law enforcement. It runs from a USB flash drive. When plugged into a computer and run, it will copy to the flash drive the sorts of forensics information that law enforcement is looking for. The idea behind the tool is that law enforcement gets search warrants to enter a building and search a computer. They don't want to turn off the computer for two reasons. The first is they want to catch the suspect "in the act" -- for example, having child porn up on the screen (rather than simply on the hard drive). Second, if the suspect is encrypting things, then he will be available unencrypted as long as the machine is on, but become unavailable once it is turned off (unless he gets the password).

There is nothing special or evil about COFEE. Initial news stories reported it was a special "device" with some sort of powerful tools produced by Microsoft. That was just hype. It's really just a USB flash drive. The tools are just the standard set of tools that anybody can download from the Internet. For example, in order to see what computers the suspect is connected to, it simply runs "netstat" from the command line and dumps the output to a file (on the USB drive).

The version on BitTorrent contains only Microsoft tools, so I don't know for certain what other tools it might run. Yet similar forensics toolkits all run the same sorts of programs. They run standard tools for grabbing the browser history (from Firefox and IE). They run versions of "pwdump" to grab the password hashes for offline cracking. They copy the browser cache. They look for recently changed files. They might scour the hard drive and take an MD5 hash of all the files. They look for unique device IDs, such as your MAC address or built-in hard drive ID.

One of the worries is that now that the tool is public, criminals can now defend against it. This is nonsense. Police forensics are already well-known, and criminals already know how to defend against them.

Flush your browser history/cache/cookies, don't save your online passwords, save everything to encrypted disks, enable the "lock" screen-saver, disable "LM" hashes, and choose complex passwords.

Tools like COFEE don't do anything extra that is unknown or secret. What makes them dangerous (to criminals) is that law enforcement agents can run them without much training, in an automated fashion. That means if you are arrested, then chances are high your browser history will show up in court as evidence -- not because the agents were skilled at grabbing that evidence, but because the tools made it easy for them.

Robert Graham is CEO of Errata Security. Special to Dark Reading

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9079
PUBLISHED: 2020-08-11
FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism. An attacker has to find a way to exploit the vulnerability to conduct directed attacks against the affected product.
CVE-2020-16275
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-16276
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16277
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16278
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.