my-cybersecurity-portfolio

🧰 Skills Applied

Digital forensics triage

Windows Registry analysis

USB artifact extraction (USBSTOR)

Event log correlation

Timeline reconstruction (MAC times)

Evidence documentation

Insider threat investigation

🛠 Tools Used

Windows Event Viewer

Registry Editor / RegRipper

USBSTOR artifact review

CyberChef

PowerShell (optional)

File timestamp analysis tools

✔ Summary of Findings

Identified unauthorized USB device connection

Found matching entries in the USBSTOR registry key confirming device presence

Correlated event logs showing file access around the time of the USB connection

Detected unusual file modification timestamps (MAC times)

Evidence strongly suggested possible data exfiltration via removable media

Recommended disabling removable drives, improving logging, and monitoring high-risk users

🧩 MITRE ATT&CK Techniques

T1020 — Automated Exfiltration

T1052 — Exfiltration over Removable Media

T1083 — File and Directory Discovery

🔍 Digital Forensics: Suspicious USB Device Investigation

Overview

Conducted a digital forensics investigation into a suspected data theft incident involving an unauthorized USB device. Analyzed USB artifacts, registry keys, timestamps, and file access behavior to determine whether sensitive data was copied.


🛠 Tools & Artifacts Reviewed


🚨 Scenario

Security team suspected:

The workstation showed signs of unusual activity around 10:47 PM.


🔬 Investigation Steps

1. USB Device History Review (Registry Artifacts)

Reviewed:

HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
HKLM\SYSTEM\CurrentControlSet\Enum\USB

Found:


2. Correlated User Session Activity

Reviewed:

Findings:


3. File Access Timeline (NTFS MAC Times)

Reviewed:

Findings:


4. System Sweep for Deleted or Temporary Artifacts

Checked:

Findings:


✔ Final Conclusion

The combined evidence strongly supports unauthorized data transfer via a removable USB device by an internal user.
While Windows does not log copy events, the forensic timeline aligns precisely with suspicious activity.


🛡 Recommendations

Technical Controls

Policy & Training


📌 Outcome

Successfully built a full forensic timeline that identified high-risk insider behavior. Recommended DLP and monitoring upgrades to prevent future incidents.