Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Cisco Releases Guides for Analyzing Compromised Devices

Cisco has released new guides to help first responders collect forensic evidence from potentially compromised or tampered with IOS, IOS XE, ASA, and Firepower Threat Defense (FTD) devices.

Cisco has released new guides to help first responders collect forensic evidence from potentially compromised or tampered with IOS, IOS XE, ASA, and Firepower Threat Defense (FTD) devices.

The new Forensic Investigation Procedures for First Responders guides are available in the Tactical Resources section of Cisco’s Security Portal.

There are four separate guides for ASA 5500-X series devices, ASA devices running FTD software, IOS devices, and IOS XE devices. The documents are meant to provide step-by-step instructions for collecting information that can be used to conduct a forensic analysis of devices that may have been tampered with or compromised.

First responders can use the guides to learn how to collect data on platform configuration and runtime state, analyzing image hashes for inconsistencies, examining ROM monitor configurations for signs of images being remotely loaded, obtaining crashinfo and core files, checking the integrity of images and configurations, and various other procedures that may be specific to each product.

For example, the guide for ASA devices describes a procedure for verifying the integrity of the webvpn configuration for deployments implementing SSL VPN, and the guide for IOS tells first responders about how they can analyze images if a core dump cannot be performed. The IOS XE guide contains information on exporting the text memory segment for verifying the runtime integrity of the IOSd process.

The guides instruct first responders to isolate devices that might have been compromised before starting the forensic investigation.

“This may prevent remote unloading of any implants or malware installed on the device and will prevent an adversary from monitoring commands entered on the device under investigation,” Cisco says.

Related: Cisco Patches Critical Flaws in Network Switches

Advertisement. Scroll to continue reading.

Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Related: Cisco Patches Router Vulnerabilities Targeted in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.