logo
From detection to resolution: the role of cyber forensics in cybersecurity

From detection to resolution: the role of cyber forensics in cybersecurity

The Star07-07-2025
Whenever a major cybersecurity incident occurs, the Malaysian public is usually ­reassured that a thorough ­investigation is being conducted, but with few details on what has actually transpired.
This is where the subfield of cybersecurity, known as cyber forensics, enters the picture.
Cyber Sherlocks
According to National Cyber Security Agency (Nacsa) chief executive Dr Megat Zuhairy Megat Tajuddin, cyber forensics plays a critical role from the ­earliest stages of cyber incident response.
At that point in the investigation, investigators work to preserve volatile evidence such as memory dumps, system logs, and network traffic, which can be easily lost when a compromised system, virtual machine, or cloud container is shut down.
According to Megat Zuhairy, cyber forensics plays a critical role from the ­earliest stages of cyber incident response. — Dr MEGAT ZUHAIRY MEGAT TAJUDDIN
'Cyber forensics is a specialised area within the broader field of cybersecurity that focuses on identifying, ­preserving, analysing, and interpreting ­digital evidence ­following a cyber incident.
'While cybersecurity emphasises proactive defence, such as threat ­prevention, system hardening, and monitoring, cyber forensics is more reactive, providing critical insights post-­incident.
'It helps uncover how a breach occurred, assesses the extent of impact, and ­supports efforts to improve security ­moving forward,' he says, stressing that 'both fields are complementary and equally vital in a robust cybersecurity strategy'.
Financial forensics expert and managing principal with Graymatter Forensic Advisory Raymon Ram put it in simpler terms, saying that cyber forensics is 'the process of identifying, ­preserving, analysing, and presenting digital evidence following a security breach or suspicious cyber incident'.
This comes with the end goal of uncovering 'what transpired, how it happened, and who was involved' after a cybersecurity incident has occurred. Raymon also serves as the president of the NGO Transparency International-Malaysia.
During an actual investigation, Nacsa would evaluate the extent of an incident's impact and potential risks, while technical teams handle collecting and ­analysing evidence, identifying signs of a system compromise, and collaborating with stakeholders to minimise ­damage and ­contain the threat.
In greater detail
Malaysia Cybersecurity Community Raw Security (rawSEC) chairman and co-founder Tahrizi Tahreb ­further broke down the stages of an investigation, stressing that cyber forensics is not a ­standalone activity but 'deeply embedded within the structured incident response lifecycle'.
'While incident response focuses on real-time detection and containment, digital ­forensics provides the critical insights and evidence that inform and enhance the entire process.
Tahrizi believes that when it comes to disclosure, there needs to be nuance, with clear enough information being provided to build public trust and accountability without jeopardising the cyber forensic investigation. — TAHRIZI TAHREB
'It typically comes into play very early on, during the 'Identification' phase, to confirm if a cyberattack has indeed occurred and to understand its immediate scope and nature.
'However, its most central role emerges during the 'Containment' phase. This is where specialists meticulously identify, label, record, and acquire data from all relevant sources, such as hard drives, memory, network logs, and mobile devices, while ­rigorously preserving its integrity.
'Maintaining a strict 'chain of custody' is paramount to ensure the integrity and reliability of the evidence for potential legal proceedings,' he says.
These findings are then used to guide the 'Eradication' and 'Recovery' phases, which, as the names suggest, aim to remove the threat and recover the ­affected systems.
This is followed by a 'Post-Incident' stage, where a thorough review is conducted to identify the root causes and exploited vulnerabilities and assess the effectiveness of existing defences. Lessons learnt will then be used to proactively shore up security measures.
Megat Zuhairy emphasises that Nacsa plays a crucial part when incidents have an impact on National Critical Information Infrastructure (NCII), with the agency taking a leadership role in forensic response, coordination, and oversight of the affected organisations.
'When an entity lacks the technical capability or resources to conduct proper forensic analysis, Nacsa may deploy or assign specialised response teams to provide direct support.
Tahrizi stresses that cyber forensics is not a ­standalone activity but 'deeply embedded within the structured incident response lifecycle'. — Pixabay
'Furthermore, a dedicated team from the Royal Malaysia Police (PDRM) is embedded within Nacsa to assist with cases involving potential criminal elements.
'This integration ensures that legal and law enforcement considerations are taken into account early in the investigation, helping to preserve digital evidence and facilitate any subsequent legal action,' Megat Zuhairy says.
He adds that cases have become increasingly ­complex over the years, with a shift away from opportunistic attacks like phishing and ­malware cases to well-planned, sophisticated and targeted threats deployed by highly ­coordinated operations.
'These include ransomware used for financial extortion, ­coordinated malware infections that can lead to multiple layers of impact, beacons used for ­external command-and-control communication, backdoors ­enabling stealthy remote access, and spyware designed for ­surveillance,' he says.
Talking about transparency
A key part of the cyber ­forensic process is communication with the public, which is carefully managed to avoid misinformation or premature conclusions on the cybersecurity incident.
Megat Zuhairy acknowledges that while transparency is essential, caution needs to be exercised so as to prevent ­incidents from worsening, with the focus being on conducting a comprehensive and accurate investigation rather than an immediate disclosure.
Megat Zuhairy adds that cases have become increasingly ­complex over the years, with a shift away from opportunistic attacks like phishing and ­malware cases to well-planned, sophisticated and targeted threats deployed by highly ­coordinated operations. — Pixabay
'Sharing technical details too early can be risky, as it may alert threat actors, enabling them to launch the second wave of attacks, change their tactics, or cover their tracks. For this reason, public updates are often limited during an active investigation.
'As Malaysia's national cyber security agency, Nacsa is committed to responsible ­information sharing while ­protecting national security interests.
'All external communication undergoes careful validation to ensure sensitive data, especially related to critical infrastructure or national systems, remains secure.
'Our goal is not to withhold information unnecessarily, but to strike a balance between ­transparency and operational security,' he says, adding that transparency is still a guiding principle of Nacsa.
He further says that the agency does share further information such as Tactics, Techniques, and Procedures (TTPs) used in attacks, along with recommended mitigation strategies whenever possible.
'Through this measured and strategic approach, we ensure that forensic investigations not only resolve incidents effectively but also contribute to long-term national and regional cyber resilience,' he says.
Raymon says that cyber forensics is 'the process of identifying, ­preserving, analysing, and presenting digital evidence following a security breach or suspicious cyber incident', with the end goal of uncovering 'what transpired, how it happened, and who was involved' after a cybersecurity incident. — RAYMON RAM
Similar thoughts are shared by both Raymon and Tahrizi, who believe in taking a more measured approach in transparency with the public.
'The balance lies in sharing general findings – such as the nature of the breach, affected systems, and response measures – without revealing sensitive forensic techniques or evidence trails.
'Once investigations are ­concluded, sharing lessons learnt can bolster public ­confidence and help others strengthen their own defences,' says Raymon.
Megat Zuhairy says that the full conclusion of an investigation can only be shared once all necessary legal actions have concluded, as otherwise it may jeopardise the trial involving the perpetrators, adding that such ­investigations are time-consuming.
He adds that while the agency does not usually publicly announce the full conclusion of investigations, it does publish important findings in the form of advisories that may be of use for others. These are regularly published on the Nacsa website without explicitly referring to any specific incidents.
'Updates may be issued when they serve the public interest, reinforce regulatory compliance, or provide clarity on systemic issues, while ensuring that ­confidential or classified details remain protected,' he says.
Meanwhile, Tahrizi believes that there needs to be nuance, with clear enough information being provided to build public trust and accountability without jeopardising the cyber forensic investigation.
'Privacy concerns are also ­paramount. Digital forensics often involves highly sensitive data, including personal communications, medical records, and financial transactions.
'Forensic professionals have an ethical responsibility to avoid unauthorised data access, respect individual privacy, and ensure proper handling of ­evidence.
'In Malaysia, the recent Cyber Security Act 2024 and the Publicly Accessible Data Universe (Padu) database have sparked significant debate regarding ­privacy, especially since the Personal Data Protection Act 2010 (PDPA) does not apply to government agencies, leaving ­citizens without legal recourse in case of misuse or breaches,' he says.
Workforce woes
All three agree that Malaysia is suffering from a ­significant lack of manpower when it comes to the broader field of cybersecurity, which has also affected cyber forensics.
From Tahrizi's perspective, the shortfall is something that Malaysia struggles with, especially due to the rapid ­digital ­transformation in the country, with talent pipelines not matching the pace of ­development.
'The numbers paint a clear picture: as of mid-2024, Malaysia had approximately 16,765 cybersecurity personnel.
'Yet, the projected requirement stands at 26,430 by the end of 2025 and 28,068 by 2026.
After a cyber incident, investigators work to preserve volatile evidence such as memory dumps, system logs, and network traffic, which can be easily lost when a compromised system, virtual machine, or cloud container is shut down. — Pixabay
'This talent gap isn't just an abstract number; it's a tangible vulnerability. Over 90% of organisations in Malaysia and neighbouring countries have reported security breaches attributed, at least in part, to a lack of skilled cybersecurity ­professionals.
'This directly impacts our national security and economic stability,' he says, adding that the reasons for this gap are multi-­faceted, with a disconnect between academia and the industry, limited industry-­aligned training, and intense global competition making it difficult to attract and retain top talents in Malaysia.
Raymon drives the message home, saying that the problem compounds on itself since 'forensics is even more niche – it demands a unique blend of technical acumen, investigative rigour, and legal awareness'.
'Few institutions offer focused training in this field, and most graduates gravitate towards more mainstream roles like SOC (Security Operations Centre) analysts or network engineers.
'Consequently, many organisations depend on a small pool of specialists or outsource to consultancies like ours,' he says.
Megat Zuhairy says that this has to do with how cyber forensics as a whole is viewed by the public. He calls for a ­reshaping of how the field is ­perceived in order to appear more attractive to Malaysians.
'Cybersecurity is not limited to coding or working in high-tech environments. It plays a crucial role in protecting everyday aspects of modern life, from ­digital banking and transportation systems to healthcare data and national infrastructure.
'Presenting cyber forensics as a purpose-driven, problem-­solving profession can make it more relatable, impactful, and aspirational to a broader ­audience. It is a field where individuals can make a real impact.
A key part of the cyber ­forensic process is communication with the public, which is carefully managed to avoid misinformation or premature conclusions on the cybersecurity incident. — Pixabay
'Importantly, we must break the misconception that talent must only come from traditional IT backgrounds. The field of cyber forensics benefits greatly from diverse disciplines. Individuals from engineering, mathematics, and science can bring analytical and technical strengths.
'At the same time, those with backgrounds in psychology offer valuable insights into human behaviour, especially in areas like social engineering and behavioural analysis during forensic investigations,' he says.
He adds that many officers within PDRM's cyber forensic team 'enter the field without ­formal technical training but develop cyber investigative expertise over time through ­targeted training and practical experience'.
What's next?
Aside from the shortage in expertise, Megat Zuhairy believes that the rapid growth and evolution of the cyber landscape, which includes bad actors and threats to the nation at large, ­outpacing existing legislation and operational frameworks, have become a significant challenge to cyber forensic teams.
Both Tahrizi and Raymon have similarly pointed out that cross-­border cooperation is made cumbersome due to time-­consuming processes, such as Mutual Legal Assistance Treaties (MLATs), to share information and ­evidence for criminal law enforcement.
This is something that Nacsa is ­currently looking to address through ­legislation, according to Megat Zuhairy.
'Much of today's digital ­evidence is encrypted or stored across ­multiple ­jurisdictions, often within cloud infrastructures.
'This complicates access and creates legal obstacles, especially when cross-border data sharing requires mutual legal assistance treaties or diplomatic coordination,' he says.
While Malaysia led the way with the Computer Crimes Act 1997, Megat Zuhairy says that it has since lost relevance and is 'inadequate' at addressing the modern complexities of cybercrime.
'Notably, the Act does not differentiate between cyberattacks targeting national critical information infrastructure (NCII) and those affecting individuals or non-critical systems.
'This legal gap hampers the ability to impose proportionate penalties and prioritise national security interests.
'In response, Nacsa is in the process of drafting a Cybercrime Bill, which is designed to provide a more robust, technology-­neutral and future-ready legal framework.
'This Bill will introduce enhanced penalties for cyberattacks targeting NCII and will also explicitly address emerging and sophisticated threats such as ransomware, social engineering attacks, AI-driven exploits, malware, and supply chain attacks,' he says.
The Cybercrime Bill will also be aligned with international legal standards, ­specifically the Budapest Convention on Cybercrime and the UN Convention against Cybercrime, which he foresees will better facilitate cooperation across ­borders.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

PM launches ILMU, Malaysia's first home-grown multimodal AI
PM launches ILMU, Malaysia's first home-grown multimodal AI

Sinar Daily

time4 hours ago

  • Sinar Daily

PM launches ILMU, Malaysia's first home-grown multimodal AI

Fully developed, owned and operated in Malaysia, it is built by YTL AI Labs, in partnership with Universiti Malaya. 12 Aug 2025 08:43pm Prime Minister Datuk Seri Anwar Ibrahim delivers his keynote address at the official launch of the ASEAN AI Malaysia Summit 2025 at the Malaysia International Trade and Exhibition Centre, today. - Photo by Bernama KUALA LUMPUR - Prime Minister Datuk Seri Anwar Ibrahim launched Malaysia's home-grown multimodal artificial intelligence (AI) model, 'ILMU', during the inaugural ASEAN AI Malaysia Summit 2025 at the Malaysia International Trade and Exhibition Centre (MITEC) today. ILMU is Malaysia's own multimodal large language model (LLM), trained on local language and data to understand our culture, context and daily realities. Fully developed, owned and operated in Malaysia, it is built by YTL AI Labs, in partnership with Universiti Malaya (UM). ILMU keeps data local and gives the nation strategic control over its AI future, ensuring we lead with intelligence rooted in our own values and voice. The name ILMU stands for Intelek Luhur Malaysia Untukmu, reflecting the model's core values of 'Intelek', for context-aware intelligence; 'Luhur', for ethical foundations rooted in Malaysian values; 'Malaysia', for cultural and linguistic fluency; and 'Untukmu', because it is built to serve all Malaysians. ASEAN Secretary-General Dr Kao Kim Hourn and Digital Minister Gobind Singh Deo were also present at the launch. Meanwhile, Gobind, in a statement, applauded the establishment of ILMU, a groundbreaking Malaysian innovation by YTL AI Labs that reflects the national vision for a future driven by technology, inclusivity, and cultural relevance. "Built by Malaysians for Malaysians, ILMU showcases our ability to create world-class AI infrastructure while preserving our linguistic and cultural identity. "This is more than just technology; it is a step towards empowering our people, our businesses, and our nation in the digital era,' he said. YTL Power International Bhd managing director Datuk Seri Yeoh Seok Hong said ILMU represents YTL's commitment to innovation, rooted in Malaysia's diverse cultural and intellectual heritage. YTL AI Labs said ILMU performed on par with state-of-the-art models like GPT-4o and Llama 3.1. It said ILMU achieved the highest score among all frontier models in Bahasa Melayu language understanding (MalayMMLU - a test of multi-domain knowledge in Malay), demonstrating stronger performance on real-world prompts. ILMUchat (the AI Chatbot) for consumers will be available for early access on Malaysia Day, Sept 16, 2025. The public is welcome to register their interest at - BERNAMA

Govt mulling specific laws to tackle AI legal challenges, says Azalina
Govt mulling specific laws to tackle AI legal challenges, says Azalina

The Star

time5 hours ago

  • The Star

Govt mulling specific laws to tackle AI legal challenges, says Azalina

KUALA LUMPUR: The government will examine the need for specific laws on Artificial Intelligence (AI) in light of emerging legal challenges. Minister in the Prime Minister's Department (Law and Institutional Reform) Datuk Seri Azalina Othman Said ( pic ) said the current legal system needs to be upgraded, as AI-related laws require different approaches, including burden of proof, authenticity and document integrity. "Right now, whatever you say, every document is online, and because it's online you can fabricate any content," she told a press conference after launching the Malaysia National Action Plan on Business and Human Rights (NAPBHR) 2025-2030 at the Asian International Arbitration Centre (AIAC) here on Tuesday (Aug 12). She said courts must be confident in accepting AI-based evidence, as the technology can produce visuals or audio resembling individuals, but do not exist in reality, adding that the matter requires serious consideration to protect the public from fraud or manipulation. Commenting on the progress of the Political Funding Bill, she said it is still in process and subject to the agreement of political parties. "We have three Parliament sessions in a year… it (bill) is still in process," she said. On the issue of employers retaining workers' passports, Azalina stressed that such action is prohibited under Malaysian law. "You have to be fair to your workers and return the passport," she said, emphasising that Malaysia respects the human rights of all workers, including foreign workers from ASEAN countries, and must not act aggressively or unlawfully against them. Earlier in her keynote address, Azalina said the launch of the NAPBHR 2025-2030 marked Malaysia's first national framework to integrate human rights into business and corporate governance. She said the plan reflected Malaysia's commitment to the United Nations Guiding Principles as the country assumes the Asean Chairmanship. "The success of this plan demands more than government effort; it requires shared ownership," she said. The NAPBHR focuses on labour, environment and governance, and was developed through consultations since 2019 with ministries, agencies, civil society, business leaders, Indigenous communities, unions and academics. - Bernama

Malaysia considers new AI laws to address emerging legal issues
Malaysia considers new AI laws to address emerging legal issues

The Sun

time5 hours ago

  • The Sun

Malaysia considers new AI laws to address emerging legal issues

KUALA LUMPUR: The government is evaluating the necessity of enacting dedicated laws to regulate artificial intelligence (AI) amid growing legal complexities. Minister in the Prime Minister's Department (Law and Institutional Reform) Datuk Seri Azalina Othman Said highlighted the need to modernise the legal framework to address AI-specific concerns such as evidence authenticity and document integrity. 'Right now, whatever you say, every document is online, and because it's online you can fabricate any content,' she said during a press conference after launching the Malaysia National Action Plan on Business and Human Rights (NAPBHR) 2025-2030. Azalina stressed that courts must adapt to handle AI-generated evidence, which can produce realistic but fabricated visuals or audio, posing risks of fraud and manipulation. Regarding the Political Funding Bill, she confirmed it remains under discussion and subject to political consensus. 'We have three Parliament sessions in a year... it (bill) is still in process,' she said. On labour rights, Azalina reiterated that retaining workers' passports is illegal under Malaysian law, urging employers to treat all workers fairly, including foreign employees from ASEAN nations. The newly launched NAPBHR 2025-2030 represents Malaysia's first national effort to embed human rights into business practices, aligning with the United Nations Guiding Principles. Developed through multi-stakeholder consultations since 2019, the plan prioritises labour, environmental, and governance reforms. 'The success of this plan demands more than government effort; it requires shared ownership,' Azalina added. – Bernama

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store