Free Essay

Forensic Studies Volatility

In:

Submitted By limweifei92
Words 1584
Pages 7
Forensicc studies volatility
1. List the processes that were running on the victim’s machine. Which process was most likely responsible for the initial exploit?

Figure 1 seeking the profile
As shown in figure one, when the command “vol imageinfo –f /root/Desktop/BF.vmem” is applied, the result shows the suggested profile which is WinXPSP2x86 and WinXPSP3x86.With that we can able to identify the profile victim is using.
Figure 2 Result of Pslist
By using the “Pslist” command, we are able to trace the process running in the victim and based on the scenario provided, the user was emailed a link to a suspicious PDF by a co-worker. The chaos happened after the PDF file is opened. As shown in figure 2, “AcroRd32.exe” with PID 1752 is most likely responsible for the exploit. The PPID (parent PID) of AcroRd32.exe is 888 which indicate firefox.exe.

2. List the sockets that were open on the victim’s machine during infection. Are there any suspicious processes that have sockets open?

Figure 3 Result of listing Sockets
Figure 3 shows the list of socket that were opened on the victim’s machine during the exploitation

Figure 4 Result of Connection
The figure above shows the list of connection found in victim’s machine and the most suspicious connection to external website is the AcroRd32.exe (PID 1752) and svchost.exe (PID 880). These application caught our attention because it does not have any outbound HTTP connections.

Figure 5 Information of IP
After finding it suspicious, we did a further investigation towards the Ip address and eventually we found 193.104.22.71 is an Iran hosting and 212.150.164.203 is an Israel hosting. Another thing we found interesting is when we refers to connection list above, we found the only process connected with the Iran hosting is PID 880 which is the svchost.exe while two processes connecting with Israel hosting are PID 888 firefox.exe and PID 1752 AcroRd.exe. Moreover, by referring to ftp://193.170.235.123/Lernbehelfe/Netzwerke/NWTU/Liste_Portnummern.pdf,
PID 880 svchost.exe has a socket object for TCP port 30301 where this port is normally associated with “BitTorrent” and so is unusual behaviour for this process. Moreover, PID 1752 (AcroRd32.exe) has a socket object on UDP port 1177 if we look on it clearly this is an Acrobat Reader process, so we concluded its unusual.

3. List any suspicious URLs that may be in the suspected process’s memory.

Figure 6 Command on Dump and View Process ID of 880
The figure above shows the command to obtain a dump of the memory from suspected process. By using the “grep” command we will able to search the relevant keyword in the dumped process and save it for review. From the lists of the url we can conclude the machine is being compromise. It is because we can identify the HTTP headers are mostly in kernel space. Thusby looking on some suspicious url such as http://193.104.22.71/~produkt/9j856f_4m9y8urb.php, we can identify it’s a virus referring to http://malwaretips.com. Other suspicious url would be the link which associated with old version.com, search-result-plus and etc. which been blacklisted in some antivirus company such as Norton and Mcafee.

Figure 7 List of Suspicious Url

Figure 8 List of Suspicious Url

Figure 9 List of Suspicious Url

Figure 10 List of Suspicious Url

Figure 11 List of Suspicious Url

Figure 12 List of Suspicious Url

Figure 13 List of Suspicious Url

Figure 14 List of Suspicious Url

Figure 15 List of Suspicious Url

Figure 16 List of Suspicious Url

Figure 17 List of Suspicious Url

Figure 18 List of Suspicious Url

Figure 19 List of Suspicious Url

Figure 20 List of Suspicious Url

Figure 21 List of Suspicious Url

Figure 22 List of Suspicious Url

Figure 23 List of Suspicious Url

Figure 24 List of Suspicious Url

Figure 25 List of Suspicious Urle

Figure 26 List of Suspicious Url

Figure 27 List of Suspicious Url

Figure 28 List of Suspicious Url

Figure 29 Command on Dump and View Process ID 1752

Figure 30 List of Suspicious Url

Figure 31 List of Suspicious Url

Figure 32 List of Suspicious Url

Figure 33 List of Suspicious Url

Figure 34 List of Suspicious Url

Figure 35 List of Suspicious Url

Figure 36 List of Suspicious Url

Figure 37 List of Suspicious Url

Figure 38 List of Suspicious Url

Figure 39 List of Suspicious Url

Figure 40 List of Suspicious Url

Figure 41 List of Suspicious Url
Figure 42 List of Suspicious Url

Figure 43 List of Suspicious Url

Figure 44 List of Suspicious Url

Figure 45 List of Suspicious Url

Figure 46 List of Suspicious Url

Figure 47 List of Suspicious Url

Figure 48 List of Suspicious Url

Figure 49 List of Suspicious Url

Figure 50 List of Suspicious Url

Figure 51 List of Suspicious Url
Figure 52 List of Suspicious Url

Figure 53 List of Suspicious Url

Figure 54 List of Suspicious Url

4. Are there any processes that contain URLs that may point to banking troubles? If so, what are these processes and what are the URLs?

Figure 55 View Memory Materials

Figure 56 Bank Url
The figure above shows the bank site which we believed the user might be involving into a banking fraud case. The link can be found in the memory of svchost.exe (PID 880), svchost.exe (PID 888) and AcroRd32.exe (PID 1752).

5. List suspicious files that were loaded by any processes on the victim’s machine. From this information, what was a possible payload of the initial exploit be that would be affecting the victim’s bank account?
To list all the suspicious files loaded by processes, we need to find all open files by processes on the system. To do this, we used the volatility “handles” plugin as shows. This command allow us to find registry keys, events, window station, desktops, threads and other type of objects. In this case, our focus will be on file.
AcroRD32.exe (PID 1752)

Figure 57 Suspicious file opened by Pid 1752
As shows in the in Figure 57, PDF.php file opened by Pid 1752 which pointed to AcroRD32.exe is most probably the files that was downloaded from search-network-plus.com/cache/PDF.php?st=Internet%20Explorer%206.0 in Firefox, and maybe related to initial download of malicious PDF file (as an email from co-workers)

Winlogon.exe (PID 644)

Figure 58 Suspicious file opened by Pid 644
As shows in Figure 58, we can saw that there are3 files being opened by PID 644 which pointed to Winlogon.exe. It seems like a malware files. The file is 118784 in size. Right after that we upload all these files to VirusTotal- a website which offer a service to analyze suspicious file for virus. The results showing that this is a Trojan which used sdra64.exe to create data files local.ds and user.ds. Whereby, local.ds is used to store the encrypted configuration and user.ds is used to store encrypted stolen data.

As we can see from the open files found in memory dump, the payload of the initial exploit was Zeus Trojan which caused the problem in victim’s bank account. This Trojan is famous in stealing bank account information which sends this information to the botmaster in real time. (Symantec, 2010)

6. Are there any related registry entries associated with the payload?
As refer to Symantec, Zeus Trojan added itself to the registry to start when Windows start, using the following subkeys: (Symantec, 2010)
i) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon ii) HKEY_CURRENT_USER\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run
Therefore, we need to check the registry loaded in the memory using volatility to check whether any of this two registry exists.
Firstly, we used hivescan plugin in volatility to find the list of registry hives in the memory. The output is shown in Figure 59 below which is the offset of all registry hives.

Figure 57 hivelist results
Right after that, to find out the exact location of each registry hives, we used hivelist plugin in volatility. The results of hivelist are shown at Figure 58 below. As we can see, the exact location of the hives is shown.

Figure 58 hivelist result
However, our main focus here would be on HKLM\Software hives. Therefore, we used the offset (0xe1526748) as shown in Figure 59 below together with printkey plugins to view and determine the registry key and value.

Figure 59 Printkey Results
From the results shown in Figure 59, the registry key is spotted similar to those registry key added by Zeus Trojan as refer to Symantec. Hence, this confirmed our assumption. 7. What technique was used in the initial exploit to inject code in to the other processes?
In this question, we extract and executables file from AcroRead.exe process address space and analysed through VirusTotal. The result is shown in Figure 60 below. It is showing that the file downloaded from Adobe Acrobat process address space was infected by winlogon.exe. The registry is modified to be able to inject itself in every process address space. When the user access to the domain listed in Zues configuration file, the hacker begins to steal the credentials. However, this analysis is not completed yet as complete reverse engineering have to take place but it is not required in this case.

Figure 60 VirusTotal Results

Similar Documents

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented...

Words: 7291 - Pages: 30

Premium Essay

Stock Market

...the stock market, has offered no explanation. SEC Chairman Mary Schapiro met with the heads of six major exchanges on May 10. According to an SEC statement, a main part of the agenda was "discuss[ing] the causes of Thursday's market events [and] the potential contributing factors." A U.S. House of Representatives subcommittee is expected to examine the reasons for the stock plunge at a hearing on May 11. Among possible causes, media analysts and traders have cited erroneous trades, currency spikes, market regulations, and high-frequency, computerized trading. no "single, consolidated database" "We don't know yet," says Paolo Pasquariello, who studies trading as a finance professor at the University of Michigan's Ross School of Business. Like detectives reconstructing a crime scene, regulators must embark on a long project of "forensic finance" made more difficult by the fact that U.S. equity markets have become fragmented among different exchanges and trading...

Words: 896 - Pages: 4

Free Essay

Forensic

...Restoration of Obliterated Marks in Forensic Science Practice and Investigations R. Kuppuswamy Forensic Science Programme, School of Health Sciences, Universiti Sains Malaysia Malaysia 1. Introduction 1.1 The problem A problem of common occurrence in forensic science is the restoration of obliterated serial numbers on the chassis and engine of stolen motor vehicles, firearms, jewellery, valuable tools, and machinery (Nickols, 1956; Wolfer & Lee, 1960; Jackson, 1962; Cunliffe & Piazaa, 1980; De Forest & Gaensslen, 1983; Schaefer, 1987; O’Hara & O’Hara, 1994; Moenssens et al (1995); Heard, 1997; Petterd, 2000; Lyle, 2004; Katterwe, 2006; Seigel, 2007; Mozayani & Noziglia, 2006; Jackson et al (2008); Levin, 2010). Serial numbers or other markings, which are unique to that particular item, are usually marked on the above metal surfaces during the manufacturing process. Criminals alter or obliterate these identification marks during thefts or other illegal uses in order to prevent their identity. On many occasions a fraudulent number would be introduced after removing the original one. In abandoned vehicles all serial numbers are verified in order to detect alterations in the identity of the vehicle (Svensson et al, 1981). Sometimes the serial numbers on firearms are removed more professionally making it hard to distinguish whether the numbers are original or not (Shoshani et al, 2001). Restoration of the original obliterated numbers provides important forensic evidence in order to return...

Words: 10345 - Pages: 42

Premium Essay

Infosec Career

...Even once a person realizes he or she has a passion for information security, moving in the field can seem a daunting task. The education market is oversaturated with degrees, certifications, and training programs. Meanwhile, many prominent hackers mock those programs publicly. Although I’ve touched on security education and training quite a bit, I’m continually asked to provide a resource for people who are trying to transition from school or other fields into Information Security roles. Ours is a healthy job market and we do need qualified and motivated applicants. The jobs exist, but we repeatedly see candidates being given false advice to get them. With tremendous and very much appreciated help from many of my colleagues and friends in the field, I have endeavored to compile a comprehensive blog about starting an InfoSec career. This is a very lengthy blog broken into sections that may help people as parts or as a whole. We want you to succeed in our field. As always, please feel free to ask questions or leave comments / gripes / suggestions. Chapter 1: The Fundamentals  Unfortunately, for all the interminable hacking tool tutorials and security guides floating around the internet, many InfoSec job candidates haven’t grasped two fundamental concepts: * To hack something (or defend it from hacking), you must have a solid understanding of how that thing works. And, * InfoSec is not a career that can be put in a box once you go home from work or school. You must be...

Words: 11232 - Pages: 45

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Free Essay

Global Dairy

...www.pwc.com Global Agribusiness Monthly commentary from our Agribusiness experts around the Globe. October 2014 Contents Regional views Did you know? Publications Calendar of events Prices Global Agribusiness contacts 2 8 11 13 14 21 Regional views Overview With teams around the Globe, this document sets out to give a flavour of what our local agribusiness experts are observing in their territories. This month we are reminded of the ever present impact of volatility on Global agriculture. We have seen significant falls in dairy commodities, grains and oils in 2014 with coffee soaring in the opposite direction on the back of a drought in Brazil. The moves have happened quickly (e.g dairy down over 50% in New Zealand since February 2014 and coffee spot prices up over 30% since August 2014) and this can be difficult for farm families or small holders to deal with. For example in the UK, dairy farmers have taken to public protests and blockades. At PwC we are bullish on the long term prospects for agriculture given Global population and wealth trends however we also recognise that this future optimism can be meaningless to a farmer when short term production costs exceed selling price. Agriculture is a volatile industry and participants have to put in place their own strategies to deal with this which are right for them, be it selling forward or hedging for budget certainty, insuring where possible against crop loss, keeping a buffer of cash or liquid assets which...

Words: 9275 - Pages: 38

Premium Essay

Malaysia Company Fraud: Cooking the Book

... 13; October 2013 Cooking the Books: The Case of Malaysian Listed Companies Fathilatul Zakimi Abdul Hamid Rohami Shafie Zaleha Othman Wan Nordin Wan Hussin Faudziah Hanim Fadzil School of Accountancy Universiti Utara Malaysia Sintok, 06010 Kedah Malaysia. Abstract Cooking the books refers to fraudulent accounting activities undertaken by a business to falsify its financial statements. Thus, the objectives of this study are to investigate what the cooking-the-books activities carried out by businesses consist of, how they conduct them, and what the impact is on the business and its shareholders. The case study sample companies are two Malaysian companies that had received various awards from reputable third-party organizations. On the other hand, the activities undertaken in both companies have caused them to be labelled as Malaysian mini Enrons. We employ a qualitative research methodology as most prior research employs a quantitative methodology to investigate the determinant factors in businesses’ cooking-the-book activities. The result of the study shows that the managers have used their positions, prior experience, and regulatory loopholes in their activities. Furthermore, the financial report restatement and higher reported earnings are the early warning signals of their activities. As a result of this, the Malaysian Securities Commission has revised the corporate governance code, and among others incorporated the Audit Oversight Board, known in the US as the Public...

Words: 5312 - Pages: 22

Premium Essay

Valuing Biotech Companies

...FORENSIC ACCOUNTING SPECIAL INTEREST GROUP VALUING A BIOTECHNOLOGY COMPANY DAVID RANDERSON ACUITY TECHNOLOGY MANAGEMENT PTY LTD Melbourne, May 2001 1. Valuation Methodologies Techniques used for valuing intangible assets, of which intellectual property (IP) is one form, may be put into three main categories1: 1. Cost Based; 2. Market Based; and 3. Revenue Based. Biotechnology companies, because their main assets are generally IP, have values that are invariably determined by their intangible assets. The valuation of a mature company tends to follow a methodology that draws heavily on its historical income, either by performing a discounted cash flow of future earnings the confidence in which derives from past activity, or capitalisation of maintainable earnings. Another technique considers the orderly realisation of assets. As most biotechnology companies have no historical revenues and the tangible assets are not representative of a company’s real value, these methods are seldom applicable. Conceptually, the value of a company is the sum of its assets value. However, accounting practices allow companies to reflect only the tangible part of their assets. Obviously, high valuations of companies that are in negative cash flow and with minimal tangible assets is causing concern to the taxation office (as demonstrated by their stance on core technology valuations in R&D syndicates) and the Australian Securities and Investment Commission (ASIC). 1 Reilly RF, Schweihs...

Words: 5247 - Pages: 21

Free Essay

Aacsb Table 10-1: Summary of Faculty Qualifications, Development Activities, and Professional Responsibilities

...Development Activities Supporting AQ or PQ Status | | Name | Highest Earned Degree & Year | Date of First Appointment to the School | Percent of Time Dedicated to the School's Mission | Acad Qual | Prof Qual | Other | Intell. Contrib. | Prof. Exper. | Consult. | Prof. Develop. | Other Prof. Activities | NormalProfessionalResponsibilities | | | | | | | | | | | | | | Som Bhattacharya | Ph D, 1994 | | 100.0 | YES | | | 12 (5) | Service: 0Work: 0 | 0 | 0 | Editor/Review: 6Other:13 | UG, GR, RES, SER and ADM | Intellectual Contributions (12) Hopwood, W., Bhattacharya, S., Premuroso, R. (2011). Tasteless Tea Company: A Comprehensive Revenue Transaction Cycle Case Study. Issues in Accounting Education, 26(1), 163-179. Cao, J., Nicolaou, A., Bhattacharya, S. (2010). A Longitudinal Study of market and Firm Level Factors Influencing ERP Systems’ Adoption and Post-Implementation System Enhancement Options. 7th Annual International Conference on Enterprise Systems, Accounting, and Logistics. Rhodos: ICESAL. Behara, R., Bhattacharya, S. (2008). DNA of a successful BPO. Journal of Service Science, 1(1), 111-118. Premuroso, R., Bhattacharya, S. (2008). Do Early Members of XBRL International Signal Superior Corporate Governance and Future Operating Performance? International Journal of Accounting Information Systems, 9(1), 1-20. Nicolaou, A., Bhattacharya, S. (2008). Post-Implementation Quality and Performance Outcomes of Enterprise Resource Planning System Use. Enterprise...

Words: 51731 - Pages: 207

Premium Essay

Marketing Audit

...MKT 5000 MARKETING MANAGEMENT Assignment 1 Semester 1 July 2011 MARKETING AUDIT FOR BIOSYSTEMS ENGINEERING PTY LTD. Prepared by: KEDAR CHAVAN Student number: U0061023717 Date submitted: 26Th August 2011 Executive Summary Biosystems Engineering Pty Ltd was incepted in year 1999 under the proprietorship of Richard Sulman and further registered in year 2008. It was developed to significantly improve the way today’s working of environmental projects and issues. With the ever increasing concern for environmental problems their product and services offered tremendous advantages to local environment. Biosystems Engineering Pty Ltd will be positioned as high-end disseminators in engineering knowledge to solve systems problems in agriculture, food, forestry, natural resources and the environment. There is currently no other company that produces and serves this type of management features they developed. The potential market for the product and services is very promising. Biosystems Engineering Pty Ltd has executed over 36 major projects and currently working on the world’s first Short rotation woody crop (SRC) harvester. The Management Team members have strong backgrounds in project management, manufacturing, research, analysis, designs and software development. The Australian market continues to have an increasing number of eco-friendly firms looking to enter the market. It must be aware of competition on all levels and maintain its operational performance...

Words: 5162 - Pages: 21

Premium Essay

Valuing Coca Cola

...Valuing Coca-Cola Using The Free Cash Flow To Equity Valuation Model John C. Gardner, University of New Orleans, USA Carl B. McGowan, Jr., Norfolk State University, USA Susan E. Moeller, Eastern Michigan University, USA ABSTRACT In this paper, we provide a detailed example of applying the free cash flow to equity valuation model proposed in Damodaran (2006). Damodaran (2006) argues that the value of a stock is the discounted present value of the future free cash flow to equity discounted at the cost of equity. We combine the free cash flow to equity model with the super-normal growth model to determine the current value of Coca-Cola. At the time of this paper, we determined a value of Coca-Cola at $161 billion using the free cash flow to equity model, and the actual market value of Coca-Cola was $150 billion. Keywords: Coca-Cola; Free Cash Flow to Equity; Equity Valuation; Super-normal Growth Model CORPORATE FINANCIAL MANAGEMENT AND STOCK VALUATION C orporate financial management encompasses the efficient acquisition and allocation of funds. The objective of corporate financial management is to maximize the value of the firm. Solomon (1963, page 22, Chapter II) argues that wealth maximization should be the goal of corporate financial management because this criterion maximizes the wealth of the owners of corporations and maximizes the wealth of a society by maximizing economic output. The value of the firm is measured by the market capitalization of the firm. The...

Words: 4461 - Pages: 18

Free Essay

Current Account Imbalance of the Kyrgyz Republic

...Current Account Imbalance of the Kyrgyz Republic Name Institutional Affiliation Current Account Imbalance of the Kyrgyz Republic A country’s current account is a critical indicator of the economy’s health and delineates the difference between a nation’s investments and savings. Being the sum of the balance of trade, net current transfers and remittances from abroad, a current account has the potential to indicate to investors that whether a country relies on borrowing to funds its operations or lends to others for the same reasons. The objective of this paper is to critically evaluate the current account imbalances of the Kyrgyz Republic, identify the economic contributors to the imbalances and recommend corrective measures through policy development and implementation. The current account deficit can largely be described as a significant percent of a depressed level of the Gross Domestic Product (GDP). Since the deficit emerged early after the country’s transition into an independent state from the Soviet Union, it is largely attributed to the alarming situation where the capital inflows in the country were larger at the beginning of the transition but have since leveled off. In addition, the high demands for imports and exposure of the country to external shocks are among the factors that have caused the country’s foreign exchange reserves and foreign direct investments to declines. These result in a balance of payment crisis that are further exacerbated by the financial...

Words: 8994 - Pages: 36

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Premium Essay

Bain & Co

...GLOBAL PRIVATE EQUITY REPORT 2013 About Bain & Company’s Private Equity business Bain & Company is the leading consulting partner to the private equity (PE) industry and its stakeholders. Private equity consulting at Bain has grown 13-fold over the past 15 years and now represents about one-quarter of the firm’s global business. We maintain a global network of more than 400 experienced professionals serving PE clients. Our practice is more than three times larger than that of the next-largest consulting firm serving private equity funds. Bain’s work with PE spans fund types, including buyout, infrastructure, real estate, debt and hedge funds. We also work with many of the most prominent limited partners (LPs) to PE firms, including sovereign wealth funds, pension funds, financial institutions, endowments and family investment offices. We support our clients across a broad range of objectives: Deal generation: We help PE funds develop the right investment thesis and enhance deal flow, profiling industries, screening companies and devising a plan to approach targets. Due diligence: We help funds make better deal decisions by performing diligence, assessing performance improvement opportunities and providing a post-acquisition agenda. Immediate post-acquisition: We support the pursuit of rapid returns by developing a strategic blueprint for the acquired company, leading workshops that align management with strategic priorities and directing focused initiatives. Ongoing value addition:...

Words: 27471 - Pages: 110

Premium Essay

Worldcom

...Executive Summary In this case of accounting fraud at WorldCom, we have identified problems which had grew as the business scale of WorldCom (formerly known as LDDS) expanded, its direction of business started to drift away when its attempt to merge with Sprint was terminated by the U.S. Justice Department and the telecommunication industry started to deteriorate in 2000. The managers, particularly Bernard J. Ebbers and Scott Sullivan, struggled to maintain the company's main performance indicator, the Expense-to-Revenue (E/R) ratio in order to maintain its lucrative image. As the size of the organization increase through extensive mergers and acquisitions, the corporate culture of the company was all jumbled up and there were no uniformity in the management policies in each department. Furthermore, the company's focus on building revenue and disregarding the long-term costs had caused the company burdensome amount of expenses. While the telecommunication industry decline, the managers was forced to use extremity to sustain the good image of the business, thus started to manipulate the accounts, specifically through the release of accruals and capitalization of costs. The conduct was performed through monarch orders by the top management commanding the General Accounting Department to manipulate the accounts, restricting the scope of inquiry of the Internal Audit Department, misleading the External Auditor and also the Board of Directors. Executive Summary Table of Contents ...

Words: 7586 - Pages: 31