EC-MEA June 2023

Page 68

GUEST COLUMN

Navigating the trade-offs of cyber attribution It is crucial that security teams first understand their own requirements and limitations before deciding on which level of attribution to pursue, as this allows for an agile “just enough” approach to security.

A

ttribution matters, but to what extent? The game of cyber whodunit is often perceived as a clean and binary question, where threat activity is either attributed or it is not. Yet, it is typically a more complex process that regularly involves difficult trade-offs. Different forms of attribution—ranging from simply linking threat clusters together to identifying the names and faces of an adversary—present vastly different challenges and resource requirements. Analysts making attribution judgements must also weigh up several competing priorities, including the deadlines set by stakeholders, the completeness of data, and the confidence level behind their assessments.

The Three Tiers of Threat Actor and Attribution Analysis Security researchers rarely attribute threat activity to named individuals or organizations. More commonly, attribution involves clustering discrete indicators such as IP addresses or domains that are in some way related. This is commonly known as tactical attribution. Once tactical attribution is achieved, researchers can begin extrapolating characteristics from these activity clusters to achieve operational profiling. Examples of operational profiling include statements such as “a loosely-affiliated group of mostly amateur individuals” or “a coordinated group of criminals with access to sophisticated tools”. By extrapolating out these capabilities, behaviors, motivations, and other characteristics, researchers can get ahead of the threat because they can anticipate if, how, and why an actor may act. Finally, once operational attribution is achieved, researchers may then look to establish strategic attribution. That is, the identity of a threat group or threat actor. This may include an individual’s name or associations, or this identity may only be defined by the sponsor, or ultimate beneficiary, of the threat operations.

68

EC JUNE_2023.indd 68

MEA

Analytical Independence Various entities weigh in on attribution, including CTI vendors, government agencies, and independent researchers. This poses a question on how much we should trust others. Ignoring all third-party intelligence in the pursuit of complete independence would mean neglecting valuable insight. Conversely, sloppy clustering between threat actors tracked by different entities can quickly lead to confusion and imprecision. For example, the threat actor dubbed “Winnti” became increasingly vacuous due to inconsistent methodologies, dubious clustering, and a lack of collaboration between different security organizations. Mandiant naturally pays attention to threat research published by a wide variety of entities and our analysts will explore whether we have overlapping visibility within our own collection universe. However, we are also committed to developing attribution judgements that are firmly based on our independent analysis and primary-source collection data.

Confidence Levels CTI functions should avoid making rash attribution judgments, yet an overly cautious approach can stymie action. Ultimately, if the bar to merging threat clusters is too high, stakeholders will struggle to tackle key threats in a timely fashion. Mandiant Intelligence practices a flexible approach through the use of uncategorized threat clusters (referred to as UNC groups). This enables us to reveal useful insight into threats quickly and without having to complete a lengthy attribution process straight away. For example, shortly after the 2020 SolarWinds supply chain compromise, Mandiant Intelligence released details on the threat actor behind the campaign: UNC2452. This

J U N E 2023

6/16/2023 5:37:16 PM


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

The rise of service robots

5min
pages 76-78

Right solutions, strategy and insights

3min
pages 74-75

Tips for CISOs to enable better business experiences and outcomes in 2023

3min
pages 72-73

How to build an API with security in mind

3min
pages 70-71

Navigating the trade-offs of cyber attribution

3min
pages 68-69

Technology is evolving fast and making the world a more connected place

3min
pages 66-67

6 Government IT trends to watch in 2023

3min
pages 64-65

Trellix launches comprehensive Endpoint Security Suite

0
page 63

Infopercept launches Invinsense 4.0

0
page 63

AVEVA announces launch of AVEVA Predictive Analytics software

1min
page 62

AI, and blockchain to streamline processes, reduce costs, and increase transparency

3min
pages 60-62

Supply chain: Automation plays a key role in promoting sustainability

3min
pages 58-59

Supply chain and digital transformation

2min
pages 56-57

Safeguarding data across borders

7min
pages 50-55

Tech trends, reshaping data storage

3min
pages 48-49

Business growth, sustainability insights: a road to success

3min
pages 46-47

SolarWinds adds transformative AI features to IT service management solutions

1min
pages 44-45

SunMoney Solar Group invests in a revolutionary tyre recycling technology

1min
page 44

Fake ChatGPT apps scam users out of thousands of dollars, Sophos reports

1min
page 43

SAS commits $1B to AI-powered industry solutions

1min
page 43

Porter announces first-ever international expansion with its foray into UAE

1min
page 42

IFZA joins forces with ZOHO to help businesses improve efficiency

1min
page 42

BenQ with instant products and solutions

1min
page 41

AVEVA recognized as a leader in the IDC market scape

0
page 41

Veritas simplifies FY24 channel program to help partners drive growth

1min
page 40

Proofpoint’s 2023 Voice of the CISO report revelations

1min
page 40

New Pure Storage survey underscores importance of IT modernization

1min
page 39

Mindware expands distribution agreement with Trellix

1min
page 39

NetApp delivers simplicity and savings to block storage with new All-Flash SAN Array

1min
page 38

Nozomi Networks delivers industry’s first AI-powered cybersecurity analysis and response engine

1min
page 38

Gartner survey finds CEOs cite AI as the top disruptive technology impacting industries

1min
page 37

Salesforce drives customer transformation in the Middle East with latest AI, Data and CRM tools

1min
page 37

BeyondTrust global survey provides insights on identity issues

1min
page 36

Cloudflare equips organizations with the Zero Trust security

1min
page 36

Kissflow awards Middle East Business Partners with Tesla Model 3

1min
pages 34-35

GITEX Africa, the most influential tech event

1min
pages 32-33

UAE Cyber Security Council

3min
pages 22-23

7th edition of GCC Security Symposium Saudi Arabia

2min
pages 16-17

7th edition of GCC Security Symposium Qatar edition

2min
pages 10-11

CloudHost presents Fusion Cloud - Bringing unity in diversity

2min
page 9

Treasury Transformation: the trendsetting force

2min
pages 8-9

Embracing Limitless Possibilities

8min
pages 3, 5-8
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.