Digital Forensics to Prove Authenticity and Detect Malware in Email Sent on Directorat of Inovation and Bussiness Incubator
DOI:
https://doi.org/10.62411/tc.v24i4.14721Abstract
Abstract - The Directorate of Innovation and Business Incubator (DIIB) at Bina Darma University often receives emails from external sources, increasing the risk of phishing, spoofing, and malware threats. This study applies the Digital Forensic Research Workshop (DFRWS) framework comprising Identification, Preservation, Collection, Examination, Analysis, and Presentation to analyze suspicious emails using forensic tools such as MXToolbox, Whois Lookup, Talos Intelligence, Sucuri SiteCheck, and VirusTotal. Ten suspicious emails were examined. Most failed one or more authentication checks (SPF, DKIM, DMARC), indicating weak verification and potential spoofing. Domain and IP analyses showed public domains like Gmail and Yahoo were most exploited, while official domains such as Upj.ac.id and Maranatha.ac.id had moderate risk. Sucuri classified most domains as medium to high risk, and VirusTotal found no active malware. The study concludes that phishing and spoofing pose greater threats than direct malware, highlighting the importance of forensic email analysis to enhance cybersecurity awareness at DIIB. Keywords – DIIB, Email, DFRWS, Malware, ToolsDownloads
Published
Issue
Section
License
Copyright (c) 2025 Rahmat Novrianda Dasmen, Muhammad Dimas Putra, Rasmila Rasmila

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
License Terms
All articles published in Techno.COM Journal are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means:
1. Attribution
Readers and users are free to:
-
Share – Copy and redistribute the material in any medium or format.
-
Adapt – Remix, transform, and build upon the material.
As long as proper credit is given to the original work by citing the author(s) and the journal.
2. Non-Commercial Use
-
The material cannot be used for commercial purposes.
-
Commercial use includes selling the content, using it in commercial advertising, or integrating it into products/services for profit.
3. Rights of Authors
-
Authors retain copyright and grant Techno.COM Journal the right to publish the article.
-
Authors can distribute their work (e.g., in institutional repositories or personal websites) with proper acknowledgment of the journal.
4. No Additional Restrictions
-
The journal cannot apply legal terms or technological measures that restrict others from using the material in ways allowed by the license.
5. Disclaimer
-
The journal is not responsible for how the published content is used by third parties.
-
The opinions expressed in the articles are solely those of the authors.
For more details, visit the Creative Commons License Page:
? https://creativecommons.org/licenses/by-nc/4.0/










