As a result, if you are not taking precautions to stay anonymous, your IP address will show up in various logs and be visible to miscreants. The next steps you take in your research may lead you to websites owned by the criminals. You collected malicious domain names, IP addresses, and other data related to the malware. For example, let’s say you work at a financial firm and you recently detected that a banking trojan infected several of your systems. You do not want information to show up in logs and other records that might tie back to you or your organization.
The justification for anonymity when researching malware and bad guys is pretty straightforward. However, that does not mean you’re doing anything wrong or illegal. When doing any number of things on the Internet, there are plenty of reasons you might want to go incognito. Unfortunately, your private information is largely available if someone is watching.
We do not want people knowing what we typed in Google, what we said in our Instant Message conversations, or what websites we visited. This idea of wanting privacy also extends to the use of the Internet. We have curtains on our windows, doors for our offices, and even special screen protectors for computers to keep out prying eyes. In our daily lives we like to have a certain level of privacy. Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (2011) Chapter 1.