My post Attribution Is Not Just Malware Analysis raised some questions that I will try to address here. I'd like to cite Mike Cloppert as inspiration for some of this post.
Attribution means identifying the threat, meaning the party perpetrating the attack. Attribution is not just malware analysis. There are multiple factors that can be evaluated to try to attribute an attack.
- Timing. What is the timing of the attack, i.e., fast, slow, in groups, isolated, etc.?
- Victims or targets. Who is being attacked?
- Attack source. What is the technical source of the attack, i.e., source IP addresses, etc.?
- Delivery mechanism. How is the attack delivered?
- Vulnerability or exposure. What service, application, or other aspect of business is attacked?
- Exploit or payload. What exploit is used to attack the vulnerability or exposure?
- Weaponization technique. How was the exploit created?
- Post-exploitation activity. What does the intruder do next?
- Command and control method. How does the intruder establish command and control?
- Command and control servers. To what systems does the intruder connect to conduct command and control?
- Tools. What tools does the intruder use post-exploitation?
- Persistence mechanism. How does the intruder maintain persistence?
- Propagation method. How does the intruder expand control?
- Data target. What data does the intruder target?
- Data packaging. How does the intruder package data for exfiltration?
- Exfiltration method. How does the intruder exfiltrate data?
- External attribution. Did an external agency share attribution data based on their own capabilities?
- Professionalism. How professional is the execution, e.g., does keystroke monitoring show frequent mistakes, is scripting used, etc.?
- Variety of techniques. Does the intruder have many ways to accomplish its goals, or are they limited?
- Scope. What is the scope of the attack? Does it affect only a few systems, many systems?
As you can see, there are many characteristics than can be assessed in order to determine if an incident is likely caused by a certain party. Mature security shops use profiles like this to make their own intelligence assessments, often confidentially collaborating with others sharing the same problems.
0 komentar:
Posting Komentar