FAFD ICAI Indentity Theft Investigation Report
FAFD ICAI Indentity Theft Investigation Report
BATCH 197
INTERNET FRAUD
INVESTIGATION REPORT
CA. ARVIND KUMAR
9560262327
[email protected]
ICAI Mem. No: 512539
INTERNET FRAUD INVESTIGATION REPORT ICAI FAFD
BATCH 197
To,
Dear Sirs,
Attached is our report of the results of our forensic investigation of ABC Data Private Limited. We
have conducted our investigation pursuant to our engagement letter dated 31st August 2019 between
the ABC Data Private Limited and our firm.
Our procedures were performed with the due diligence. Our conclusions and findings are in
confirmatory of our engagement letter. Our analysis and observations are based upon information
provided to us as on the date of this report. It is possible that additional information may become
available following the date of our report and, if so, our analysis and observations could be affected
by such information.
Chartered Accountants
CONTENTS
• Background
• Use of Report
• Conclusion
• Recommendations
• Limitation of Liabilities
• Annexures
I. Background Mr. Kumar is a senior programmer with ABC Data Pvt. Ltd, an Indian
software company that has offices in several countries. Mr. Kumar is
heading the team of programmers working on a special Project Kensoft
– a software development project that has been awarded to the company
by the Government of Kenya.
The test revealed that most of the computers were infected with a
Trojan program. Further investigation revealed that the Trojan
spread through an infected Microsoft Word document (titled
taxdetails.doc) that Kumar had sent to all his team members. It was
also discovered that the Trojan had stolen credit card information,
bank account passwords and confidential source code from the
infected computers. This stolen information had been uploaded to
some FTP servers, all of which were now non-existent.
The finance department claims that it had never sent such an email to
Kumar. They also clarified that https://finance.abcdata.com was never
used by them. The IT department of ABC Data also stated that
https://finance.abcdata.com never existed.
II. Objective & Scope The primary objective of the investigation is to ascertain the
person/fraudster responsible for infecting the systems and stealing the
information and source code.
III. Use of the Forensic The forensic auditor is required to submit two original copies to the
Investigation Report Board of Directors of the ABC Data Pvt. Ltd. for internal purpose only
and the same cannot be used in any legal proceedings. The report is not
meant for public distribution. Consent of the forensic auditor shall need
to be taken in writing before providing this report to the third party.
Methodology
As part of the examination of this matter, the team took the following
actions:
We have done disk imaging of the system being currently used
by Mr. Kumar. MD5 Hash of the device was generated.
Individuals Interviewed
1. Microsoft Word document titled “taxdetails.doc” was checked for V. Observation &
infections using VirusTotal.com. Findings
10. On detailed examination of the digital certificates, it is apparent that V. Observation &
a certifying authority named Global CA issued a certificate to an Findings
intermediary certifying authority named ABC Data, which in turn issued
a certificate to Ms. Banerjee.
Further examination of the “certificate store” on Kumar’s computer
showed that a certificate issued by Global CA to ABC Data was stored
in the Intermediate Certification Authorities section. Additionally the
certificate of Global CA was stored in the Trusted Certification
Authorities section.
11. The IT department of ABC Data stated that they had never applied
to Global CA for a digital signature certificate.
14. With the help of the relevant Internet Service Provider it was
ascertained that the above IP address had been allotted to the computer
at the residence of Mr. Singh, who incidentally was the System
Administrator at ABC Data Pvt. Ltd.
16. Examination of the certificate services showed that “Global CA” had
been installed as a standalone certifying authority and “ABC Data” had
been installed as a standalone subordinate certifying authority.
17. Examination of the certificate services also showed that the “Ms.
Banerjee” certificate had been generated on the said computer. An SSL
certificate in the name of finance.abcdata.com was also recovered from
the computer.
VII. Recommendation Where things have gone wrong? How could have management of
ABC Data avoided this type of fraud?
The virus called “Trojan” was inserted after Mr. Kumar has installed
security certificate in his system and accessed the fake website
https://finance.abcdata.com. Thus the fraud could have been avoided
had Mr. Kumar not installed security certificate in his system and
accessed the fake website https://finance.abcdata.com.
VIII. Limitation of In no event shall the firm, its partners, directors or employees
Liabilities (collectively referred to as “the firm”) be liable in contract or tort or
under statute or otherwise for any direct, indirect or consequential loss
or damage (including loss of profits) suffered by you (or by any other
party) arising from or in connection with the services provided under
this engagement howsoever the direct, indirect or consequential loss or
damage is caused, save for our gross negligence and wilful default.
Without prejudice to the aforesaid, our aggregate liability to you or to
any other party shall be limited to the amount of 50% of the fees paid to
the firm for that portion of the work giving rise to any claim.
The liability of the firm shall be limited to that proportion of the total
loss or damage, after taking into account your contributory negligence
(if any) or the contributory negligence (if any) of any other party, which
is just and equitable having regard to the extent of the responsibility of
the firm for the loss or damage concerned and the extent of
responsibility of any other party also liable or potentially liable to you
in respect of the same loss or damage.
Any claim by you in respect of either or both of the foregoing
paragraphs must be made within one year of the date on which the work
giving rise to the claim was delivered or, if the engagement has been
terminated, within one year of the date of termination.