Pengembangan Aplikasi Mobile Berbasis Augmented Reality Untuk Pendidikan Interaktif
DOI:
https://doi.org/10.70134/jitifna.v2i1.991Keywords:
Digital Forensics, Ransomware, Network Security, Incident Analysis, CybercrimeAbstract
This study provides a comprehensive forensic analysis of a network-based ransomware attack using a digital forensics approach. Through a qualitative case study, we reconstructed a cyber incident that targeted corporate infrastructure, from the initial entry point to its final impact. The research methodology involved the acquisition of both volatile and static data, followed by in-depth analysis of various digital artifacts, including Windows Event Logs, the system registry, disk images, and memory dumps. Key findings indicate that the attack began with the exploitation of an RDP vulnerability, followed by lateral movement, the disabling of security features, and data exfiltration before the encryption process. The network forensics analysis confirmed the attackers' use of a double extortion tactic. This research underscores the critical importance of an integrated forensic approach (host, network, and memory) to obtain a complete picture of such a complex attack. The study's conclusions not only offer insights into the attackers' TTPs (Tactics, Techniques, and Procedures) but also provide strategic recommendations for strengthening an organization's cybersecurity posture in the future.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Gidion (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








