We are happy to announce the release of Magnet AXIOM Cyber 7.3. This release adds a new option to connect to VeraKey, making it even easier to quickly collect and process mobile data for your eDiscovery and internal investigations.
Optimized workflow and the ability to examine more artefacts by:
Ability to Search Artifacts by Item ID
Displaying the Image Hash Verification In Process
Performance Improvements for Conversation View and Artifact Tagging
New and updated artefacts are now available to keep your evidence sources current with the latest corporate applications and services. See the full list of artefact updates at the bottom of this post.
93% of workers under 50 report using their smartphones for work-related tasks. However, with the variety of mobile devices and rapid rate of development, it can be challenging to collect mobile data required for eDiscovery and internal investigations.
In AXIOM Cyber 7.3, Magnet Forensics has introduced the ability to acquire and process mobile images directly from VeraKey. Developed by Grayshift, VeraKey is a forensic solution that enables consent-based, complete file system data extractions from iOS and Android devices. The combination of AXIOM Cyber and VeraKey gets you the most evidence so you can quickly and easily work through investigations.
This integration not only makes it easier for you to capture important mobile data in AXIOM Cyber, with the recent merger of Magnet Forensics and Grayshift, it also expands the options to use products in the Magnet Forensics ecosystem for every step of your investigation.
SHA256 Hash Calculation for Virus Total
In AXIOM Cyber 7.2, Magnet Forensics has introduced support for SHA 256—matching the hash calculation method used by EDR tools to help make verifying hashes for individual files even easier. Now, the hash format used in VirusTotal URL lookup integration has also been updated to use SHA 256, which will mitigate any potential miscalculations with this value.
AXIOM Cyber’s VirusTotal integration allows you to quickly check files against over 70 antivirus engines, providing insight into the history and behaviour of a threat to inform your response and mitigation plans.
Improved Report Exporting Options
In many eDiscovery cases, there will be set parameters around what evidence can be included in the scope of the investigations. Building on the privileged materials workflow introduced into AXIOM Cyber in version 7.0—which enables you to conduct a broad search using a set of keywords and automatically tagging any matching artefacts—we have introduced a new exporting option that allows you to exclude tagged artefacts when creating a report. For example, you can now create a portable case or load file that excludes all artefact data that has been tagged as privileged material.
Android Device Information
Samsung Device Health Services (CPU Data and Network Stats)
Samsung Positioning Path History
Apple Health Workout
Apple Health (Distance, Floors, Heart Rate and Steps)
Digital Wellbeing Events
Facebook Messenger Groups
Facebook Messenger Users Contacted
iOS Device Information
Snapchat Group Members
Windows Startup Items
Windows Notification Center