Under false flag: using technical artifacts for cyber attack attribution

Abstract The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is in the center of interest for nation...

Full description

Bibliographic Details
Main Authors: Florian Skopik, Timea Pahi
Format: Article
Language:English
Published: SpringerOpen 2020-03-01
Series:Cybersecurity
Subjects:
Online Access:http://link.springer.com/article/10.1186/s42400-020-00048-4
id doaj-0d49d7c31d1443dd936d7e2d89120800
record_format Article
spelling doaj-0d49d7c31d1443dd936d7e2d891208002020-11-25T02:30:46ZengSpringerOpenCybersecurity2523-32462020-03-013112010.1186/s42400-020-00048-4Under false flag: using technical artifacts for cyber attack attributionFlorian Skopik0Timea Pahi1Center for Digital Safety and Security, AIT Austrian Institute of Technology, AustriaCenter for Digital Safety and Security, AIT Austrian Institute of Technology, AustriaAbstract The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is in the center of interest for nation states. Investigating if an attack was carried out in the name of a nation state is a crucial task for secret services. Many methods, tools and processes exist for network- and computer forensics that allow the collection of traces and evidences. They are the basis to associate adversarial actions to threat actors. However, a serious problem which has not got the appropriate attention from research yet, are false flag campaigns, cyber attacks which apply covert tactics to deceive or misguide attribution attempts – either to hide traces or to blame others. In this paper we provide an overview of prominent attack techniques along the cyber kill chain. We investigate traces left by attack techniques and which questions in course of the attribution process are answered by investigating these traces. Eventually, we assess how easily traces can be spoofed and rate their relevancy with respect to identifying false flag campaigns.http://link.springer.com/article/10.1186/s42400-020-00048-4Actor attributionAdvanced persistent threatsTechnical indicatorsFalse flag campaigns
collection DOAJ
language English
format Article
sources DOAJ
author Florian Skopik
Timea Pahi
spellingShingle Florian Skopik
Timea Pahi
Under false flag: using technical artifacts for cyber attack attribution
Cybersecurity
Actor attribution
Advanced persistent threats
Technical indicators
False flag campaigns
author_facet Florian Skopik
Timea Pahi
author_sort Florian Skopik
title Under false flag: using technical artifacts for cyber attack attribution
title_short Under false flag: using technical artifacts for cyber attack attribution
title_full Under false flag: using technical artifacts for cyber attack attribution
title_fullStr Under false flag: using technical artifacts for cyber attack attribution
title_full_unstemmed Under false flag: using technical artifacts for cyber attack attribution
title_sort under false flag: using technical artifacts for cyber attack attribution
publisher SpringerOpen
series Cybersecurity
issn 2523-3246
publishDate 2020-03-01
description Abstract The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is in the center of interest for nation states. Investigating if an attack was carried out in the name of a nation state is a crucial task for secret services. Many methods, tools and processes exist for network- and computer forensics that allow the collection of traces and evidences. They are the basis to associate adversarial actions to threat actors. However, a serious problem which has not got the appropriate attention from research yet, are false flag campaigns, cyber attacks which apply covert tactics to deceive or misguide attribution attempts – either to hide traces or to blame others. In this paper we provide an overview of prominent attack techniques along the cyber kill chain. We investigate traces left by attack techniques and which questions in course of the attribution process are answered by investigating these traces. Eventually, we assess how easily traces can be spoofed and rate their relevancy with respect to identifying false flag campaigns.
topic Actor attribution
Advanced persistent threats
Technical indicators
False flag campaigns
url http://link.springer.com/article/10.1186/s42400-020-00048-4
work_keys_str_mv AT florianskopik underfalseflagusingtechnicalartifactsforcyberattackattribution
AT timeapahi underfalseflagusingtechnicalartifactsforcyberattackattribution
_version_ 1724827999772082176