02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Attribution Problem – Using PAI to Improve Actor<br />

Attribution<br />

By Brian Pate, SVP, Babel Street<br />

Within the cyber community, conventional wisdom is that malicious actors can carry out attacks while<br />

hiding their true identities. Historically, analysts and investigators have predominantly focused attribution<br />

efforts on technical attack aspects, such as digital forensics, malware analysis and signature analysis.<br />

That we’ve yet to fully develop our capabilities or focus efforts at the persona level makes sense, given<br />

the technical backgrounds of analysts, traditional reliance on technical indicators of compromise and the<br />

difficulty of analyzing the volume of publicly available information. But by applying advanced tools and<br />

analysis to publicly available information (PAI), including deep and dark web data, we can begin to deny<br />

malicious actors the cloak of anonymity. Moreover, as sophisticated actors increasingly “live off the land,”<br />

repurpose commodity malware, and use cloud infrastructure to continuously change IP addresses, we’re<br />

seeing a diminution of the efficacy of technically-focused attribution. Therefore, it’s imperative that we<br />

build up our PAI capabilities now.<br />

What is attribution?<br />

Broadly speaking, the objective of attribution is to move from an attack’s technical observables or related<br />

digital personas to the true identity of an individual malicious actor, or actors, whether they be nation<br />

state-sponsored actors, ideologic actors or criminals. But while the ultimate objective is a real name and<br />

location with a high degree of confidence, it’s useful to think of attribution along a spectrum of confidence,<br />

with confidence increasing as we gather identifiers that can be used to gain valuable insights about the<br />

threat.<br />

At a basic level, PAI analysis finds and links known attack indicators, uncovers unknown indicators, and<br />

can yield location, online handles and email addresses, offline aliases and affiliations. These, in turn, can<br />

often be linked to quasi-identifiers (QIDs) such as gender, age and date of birth, contained in socialmedia<br />

metadata. Taken individually, none of these indicators are likely to return an identity with a high<br />

degree of confidence. But as operators unearth and analyze more leads from PAI sources, each identifier<br />

becomes a valuable marker on the road to attribution.<br />

120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!