Paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks

This is an 11 page white paper that goes through the current challenges faced by researchers to attribute cyber attacks.

It goes through the current techniques such as,

  • Timestamps
  • Strings, debug and metadata
  • Malware families, code reuse
  • Threat infrastructure used

It also present some of the most advance APT’s and their potential origin and techniques believed to have been used by them to thwart the attribution process by researches.

The most revealing conclusion is that cyber attribution is a difficult process that cannot ever legitimate a counter attack.


One Comment Add yours

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s