Science, Technology, Engineering and Mathematics.
Open Access

DIGITAL FORENSIC INVESTIGATION IN CYBERCRIME CASES: CASE STUDIES AND RECOMMENDATIONS

Download as PDF

Volume 2, Issue 1, Pp 9-15, 2025

DOI: https://doi.org/10.61784/mjet3018

Author(s)

Cut Rafifah Syaakirah, Luthfiyah Syifa, Iskandar Muda*

Affiliation(s)

Department Accounting, Universitas Sumatera Utara, Medan, Indonesia.

Corresponding Author

Iskandar Muda

ABSTRACT

The exponential advancement of technology and widespread internet adoption have introduced numerous advantages while simultaneously giving rise to an alarming surge in cybercrime activities such as hacking, financial fraud, identity theft, and data breaches. Digital forensic investigation has emerged as a pivotal mechanism in addressing these crimes by identifying offenders, gathering actionable evidence, and aiding judicial processes. This paper delves into the utilization of digital forensic methods in resolving cybercrime incidents, drawing on a selection of illustrative case studies to showcase the field's strengths and limitations. The research begins with an overview of the foundational concepts and techniques in digital forensics, emphasizing its interdisciplinary approach that integrates computing, legal frameworks, and investigative practices. Detailed case studies illustrate practical applications, including tracing ransomware campaigns, uncovering insider breaches within corporate environments, and analyzing fraudulent cryptocurrency activities. 

KEYWORDS

Integrating insights; Malware deconstruction; Financial fraud

CITE THIS PAPER

Cut Rafifah Syaakirah, Luthfiyah Syifa, Iskandar Muda. Digital forensic investigation in cybercrime cases: case studies and recommendations. Multidisciplinary Journal of Engineering and Technology. 2025, 2(1): 9-15. DOI: https://doi.org/10.61784/mjet3018.

REFERENCES

[1] Sihombing, E, Erlina, Rujiman. The effect of forensic accounting, training, experience, work load and professional skeptic on auditors ability to detect of fraud. International Journal of Scientific and Technology Research, 2019, 8(8): 474-480.

[2] Abdullah, I, Lubis, A W, Sumitra, A. Explanation of Forensic Accounting and Its Application (Case Some Industry Sector). Journal of Pharmaceutical Negative Results, 2022, 1585-1588. DOI: https://doi.org/10.47750/pnr.2022.13.S09.195.

[3] Khamidovich, K B, Zokirovich, K B, Mirshokhidovna, T D. General Theoretical Issues of Improving Private Forensic Methods In The Field Of Combat Against Cybercrime. Psychology and education, 2021, 58(1): 2705-2712.

[4] Yaacoub, J P A, Noura, H N, Salman, O, et al. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations. 2021. arXiv preprint arXiv:2103.17028.

[5] Choi, K S, Back, S, Toro-Allvarez, M M. Digital forensics and cyber investigation. Cognella. 2023.

[6] Hemdan, E E D, Manjaiah, D H. An efficient digital forensic model for cybercrimes investigation in cloud computing. Multimedia Tools and Applications, 2021, 80, 14255-14282.

[7] Yaacoub, J P A, Noura, H N, Salman, O, et al. Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet of Things, 2022, 19, 100544.

[8] Casino, F, Dasaklis, T K, Spathoulas, G P, et al. Research trends, challenges, and emerging topics in digital forensics: A review of reviews. IEEE Access, 2022, 10, 25464-25493.

[9] Tok, Y C, Chattopadhyay, S. Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. Forensic Science International: Digital Investigation, 2023, 45, 301540.

[10] Yeboah-Ofori, A, Brown, A D. Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 2020, 6(1): 1-8.

[11] Alazab, M, Layton, R, Broadhurst, R, et al. Malicious spam emails developments and authorship attribution. In 2013 fourth cybercrime and trustworthy computing workshop . IEEE. 2012, 58-68.

[12] Quick, D, Choo, K K R. Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence. Springer Singapore. 2018.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.