Dismiss this notice
Master PDF Editor Easter 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=6240

Dismiss this notice
Avast Premier Easter 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=6095

Dismiss this notice
Ashampoo Snap 10 Easter 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=6241

Dismiss this notice
Backup4all Professional Easter 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=6464


Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The complexities of public attribution
#1
Quote:
[Image: complexity-of-public-attribution-featured.jpg]

Over the past couple of years, we have seen an emerging trend from nation-states, or a consortium of nations publicly attributing cyberattacks to a particular adversary. In the game of spies spying on spies, it has become a game of whodunnit that can have repercussions in the real world.

Now, you may have read about APT actors on this blog or seen reports from our colleagues in the cybersecurity space in the past, but that work came from security researchers — and security researchers tend to avoid doing specific public attribution and will instead talk about clues such as the language the attackers speak, target location, and indicators of compromise (IOCs). They may even give APTs names like Fancy Bear, Equation, Desert Falcons or APT27, which may (or may not) contain hints about the characteristics of the threats.

Their actions may annoy those responsible, but this is not, say, the United Kingdom pointing a direct finger at Israel or the United States holding a press conference with indictments against members of clandestine services in Russia. As I said, there are consequences to such attribution — but as they say, all is fair in love and war.

Earlier in the month, during the Security Analyst Summit, Florian Egloff of the center for Security Studies discussed this topic during the SAS Unplugged session of the conference.

Egloff wasted no time getting into the real-world consequences of these public outings or shaming from governments around the world, which have ranged recently from sanctions to the expulsion of diplomats. The past few years have seen cybersecurity emerge as a key focal point of foreign policy. This area ranges from building out stronger investment to attribution and prevention and potentially adding public attribution to incident response.

These responses include some actions that are meant to deal direct harm to an adversary. Some actions could include offensive measures or burning a toolkit of a nation-state attacker by sharing samples with Virus Total.

This threat-response evolution continues, and in the past year, we have seen nations publicly name an actor in conjunction with one another and with policies that have taken center stage. So, what does the future hold?
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Latest Threads
PC Game Giveaway:Transistor Sci-fi-theme...
Last Post: sinanogz
Today 10:42
» Replies: 0
» Views: 4
Try Out the Reader Mode in Microsoft’s N...
Last Post: silversurfer
Yesterday 14:13
» Replies: 0
» Views: 31
Microsoft Brings a Key Security Feature ...
Last Post: silversurfer
Yesterday 14:13
» Replies: 0
» Views: 30
PC Game Giveaway:Assassins Creed Unity
Last Post: sinanogz
Yesterday 10:57
» Replies: 0
» Views: 27
LibreOffice 6.1.2
Last Post: JM Safe
Yesterday 09:53
» Replies: 5
» Views: 200
WhatsApp Will Allow Users to Block Conve...
Last Post: JM Safe
Yesterday 09:51
» Replies: 1
» Views: 32
Avast Blog_Security News: Facebook wants...
Last Post: harlan4096
Yesterday 07:51
» Replies: 0
» Views: 30
Avast Blog_Tips & Advices: Are budget-tr...
Last Post: harlan4096
Yesterday 07:49
» Replies: 0
» Views: 24
Emsisoft Anti-Malware named one of AVLab...
Last Post: harlan4096
Yesterday 07:41
» Replies: 0
» Views: 52
Next generation antivirus: the future of...
Last Post: harlan4096
Yesterday 07:38
» Replies: 0
» Views: 38
10 Chrome Extensions to Boost Your Onlin...
Last Post: harlan4096
Yesterday 07:31
» Replies: 0
» Views: 26
Microsoft Announces Surface Hub 2S: 50-I...
Last Post: harlan4096
Yesterday 07:26
» Replies: 0
» Views: 21
AMD 50th Anniversary Ryzen CPUs Listed A...
Last Post: harlan4096
Yesterday 07:24
» Replies: 0
» Views: 17
The Huawei P30 & P30 Pro Reviews: Photog...
Last Post: harlan4096
Yesterday 07:22
» Replies: 0
» Views: 28
Samsung Completes Development of 5nm EUV...
Last Post: harlan4096
Yesterday 07:20
» Replies: 0
» Views: 26
TSMC Reveals 6 nm Process Technology: 7 ...
Last Post: harlan4096
Yesterday 07:16
» Replies: 0
» Views: 23
8 ways in which Microsoft Edge (Chromium...
Last Post: harlan4096
Yesterday 07:11
» Replies: 0
» Views: 28
Google to present browser and search cho...
Last Post: harlan4096
Yesterday 07:09
» Replies: 0
» Views: 22
Ubuntu 19.04 is out
Last Post: harlan4096
Yesterday 07:07
» Replies: 0
» Views: 20
Start Menu gets its own process and a pe...
Last Post: harlan4096
Yesterday 07:04
» Replies: 0
» Views: 25

[-]
Staffs Online
There are no staff members currently online.