DIGITAL FORENSIC INVESTIGATION IN CYBERCRIME CASES: CASE STUDIES AND RECOMMENDATIONS
Volume 2, Issue 1, Pp 9-15, 2025
DOI: https://doi.org/10.61784/mjet3018
Author(s)
Cut Rafifah Syaakirah, Luthfiyah Syifa, Iskandar Muda*
Affiliation(s)
Department Accounting, Universitas Sumatera Utara, Medan, Indonesia.
Corresponding Author
Iskandar Muda
ABSTRACT
The exponential advancement of technology and widespread internet adoption have introduced numerous advantages while simultaneously giving rise to an alarming surge in cybercrime activities such as hacking, financial fraud, identity theft, and data breaches. Digital forensic investigation has emerged as a pivotal mechanism in addressing these crimes by identifying offenders, gathering actionable evidence, and aiding judicial processes. This paper delves into the utilization of digital forensic methods in resolving cybercrime incidents, drawing on a selection of illustrative case studies to showcase the field's strengths and limitations. The research begins with an overview of the foundational concepts and techniques in digital forensics, emphasizing its interdisciplinary approach that integrates computing, legal frameworks, and investigative practices. Detailed case studies illustrate practical applications, including tracing ransomware campaigns, uncovering insider breaches within corporate environments, and analyzing fraudulent cryptocurrency activities.
KEYWORDS
Integrating insights; Malware deconstruction; Financial fraud
CITE THIS PAPER
Cut Rafifah Syaakirah, Luthfiyah Syifa, Iskandar Muda. Digital forensic investigation in cybercrime cases: case studies and recommendations. Multidisciplinary Journal of Engineering and Technology. 2025, 2(1): 9-15. DOI: https://doi.org/10.61784/mjet3018.
REFERENCES
[1] Sihombing, E, Erlina, Rujiman. The effect of forensic accounting, training, experience, work load and professional skeptic on auditors ability to detect of fraud. International Journal of Scientific and Technology Research, 2019, 8(8): 474-480.
[2] Abdullah, I, Lubis, A W, Sumitra, A. Explanation of Forensic Accounting and Its Application (Case Some Industry Sector). Journal of Pharmaceutical Negative Results, 2022, 1585-1588. DOI: https://doi.org/10.47750/pnr.2022.13.S09.195.
[3] Khamidovich, K B, Zokirovich, K B, Mirshokhidovna, T D. General Theoretical Issues of Improving Private Forensic Methods In The Field Of Combat Against Cybercrime. Psychology and education, 2021, 58(1): 2705-2712.
[4] Yaacoub, J P A, Noura, H N, Salman, O, et al. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations. 2021. arXiv preprint arXiv:2103.17028.
[5] Choi, K S, Back, S, Toro-Allvarez, M M. Digital forensics and cyber investigation. Cognella. 2023.
[6] Hemdan, E E D, Manjaiah, D H. An efficient digital forensic model for cybercrimes investigation in cloud computing. Multimedia Tools and Applications, 2021, 80, 14255-14282.
[7] Yaacoub, J P A, Noura, H N, Salman, O, et al. Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet of Things, 2022, 19, 100544.
[8] Casino, F, Dasaklis, T K, Spathoulas, G P, et al. Research trends, challenges, and emerging topics in digital forensics: A review of reviews. IEEE Access, 2022, 10, 25464-25493.
[9] Tok, Y C, Chattopadhyay, S. Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. Forensic Science International: Digital Investigation, 2023, 45, 301540.
[10] Yeboah-Ofori, A, Brown, A D. Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 2020, 6(1): 1-8.
[11] Alazab, M, Layton, R, Broadhurst, R, et al. Malicious spam emails developments and authorship attribution. In 2013 fourth cybercrime and trustworthy computing workshop . IEEE. 2012, 58-68.
[12] Quick, D, Choo, K K R. Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence. Springer Singapore. 2018.