{"id":1388,"date":"2009-11-11T00:35:02","date_gmt":"2009-11-11T05:35:02","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=1388"},"modified":"2022-12-30T12:20:09","modified_gmt":"2022-12-30T17:20:09","slug":"microsoft-cop-tool-leaked","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/microsoft-cop-tool-leaked\/","title":{"rendered":"Microsoft Cop Tool Leaked"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20180111032336\/https:\/\/www.engineering.com\/Blogs\/tabid\/3207\/ArticleID\/7391\/Persistent-Security-Threats-Push-Organizations-to-Continuous-Vulnerability-Monitoring.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-110969 size-thumbnail\" title=\"Microsoft Cop Tool Leaked\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_security-5.jpg?resize=75%2C64&#038;ssl=1\" alt=\"Microsoft Cop Tool Leaked\" width=\"75\" height=\"64\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_security-5.jpg?resize=75%2C64&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_security-5.jpg?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_security-5.jpg?w=333&amp;ssl=1 333w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>I recently wrote about Microsoft&#8217;s COFEE computer forensics tool <a href=\"https:\/\/wp.me\/p2wgaW-ln\" target=\"_blank\" rel=\"noopener\">here<\/a>. Three weeks later, Yobie Benjamin at <em><a href=\"https:\/\/www.sfgate.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SFGate<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20100315042335\/http:\/\/www.sfgate.com:80\/cgi-bin\/blogs\/ybenjamin\/detail??blogid=150&amp;entry_id=51360\" target=\"_blank\" rel=\"noopener noreferrer\">writes<\/a> that Microsoft COFEE, &#8220;<strong>One of the most important tools in computer forensics and law enforcement,<\/strong>&#8221; was apparently uploaded to bit torrent site What.CD on November 09, 2009, and is now available on the Internet.<\/p>\n<p>What.CD management issued a statement, &#8220;<em>Suddenly, we were forced to take a real look at the program, its source, and the potential impact on the site and security of our users and staff&#8230; And when we did, we didn&#8217;t like what came of it. So, a decision was made. The torrent was removed (and it is not to be uploaded here again).<\/em>&#8221;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110971\" title=\"Microsoft logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-7.jpg?resize=120%2C20&#038;ssl=1\" alt=\"Microsoft logo\" width=\"120\" height=\"20\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-7.jpg?resize=75%2C12&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-7.jpg?resize=150%2C25&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-7.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a><em><a href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a><\/em> says that COFEE was so sought after in the computer underground that an enormous bounty of 1.6 terabytes of capacity was offered to the first one who would upload the software.\u00a0Robert Graham on <em>DarkReading<\/em> explains that the version on COFEE om BitTorrent has only Microsoft tools, so I don&#8217;t know for certain what other tools it might run. Yet similar forensics toolkits all run the same sorts of programs. They run standard tools for grabbing the browser history (from Firefox and IE). The tools can run versions of &#8220;pwdump&#8221; to grab the password hashes for offline cracking. The browser cache can be captured by these types of tools. They look for recently changed files. They might scour the hard drive and take an MD5 hash of all the files. Similar tools look for unique device IDs, such as your MAC address or built-in hard drive ID.<\/p>\n<div id=\"attachment_110975\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-110975\" class=\"wp-image-110975 size-medium\" title=\"Steve Ballmer is mad\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/steve_ballmer-fists-2.jpg?resize=150%2C113&#038;ssl=1\" alt=\"Steve Ballmer is mad\" width=\"150\" height=\"113\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/steve_ballmer-fists-2.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/steve_ballmer-fists-2.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/steve_ballmer-fists-2.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><p id=\"caption-attachment-110975\" class=\"wp-caption-text\"><em>Who took my COFEE<\/em><\/p><\/div>\n<p>One of the worries is that now that the tool is public, criminals can now defend against it. This is nonsense according to Graham. Police forensics are already well-known, and criminals already know how to defend against them. Graham, concludes that tools like COFEE don&#8217;t do anything extra that is unknown or secret. What makes them dangerous (to criminals) is that law enforcement agents can run them without much training, in an automated fashion.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft tool for law enforcement COFEE allows agents to run digital forensics without much training is leaked within 3 weeks of being released<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3216,1819,83,67,82,421,4],"class_list":["post-1388","post","type-post","status-publish","format-standard","hentry","category-security","tag-3216","tag-computer","tag-forensics","tag-hack","tag-microsoft","tag-msft","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1388"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions"}],"predecessor-version":[{"id":132120,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions\/132120"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}