{"id":36029,"date":"2020-06-29T06:20:02","date_gmt":"2020-06-29T10:20:02","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=36029"},"modified":"2020-10-30T06:51:05","modified_gmt":"2020-10-30T10:51:05","slug":"threat-attribution","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/threat-attribution\/36029\/","title":{"rendered":"How to find out who&#8217;s behind a cyberattack"},"content":{"rendered":"<p>Knowing who or what has attacked us is critical for survival. In cybersecurity, threat intelligence cuts through the noise to find the poisoned needle in your data stack, letting you act fast before damage spreads. But what if you could also find out who is behind the attack?<\/p>\n<blockquote><p>Threat attribution looks up attackers\u2019 \u2018fingerprints\u2019 to plan your response and defense.<\/p>\n<\/blockquote>\n<h2>How threat attribution helps if you\u2019ve been targeted by an APT<\/h2>\n<p>If you\u2019ve been targeted by an <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/advanced-persistent-threats\" target=\"_blank\" rel=\"noopener nofollow\">advanced persistent threat (APT)<\/a>, threat attribution helps you understand the attack motive and respond quickly. The cybercrime groups that carry out APT attacks are often linked to <a href=\"https:\/\/www.kaspersky.co.uk\/resource-center\/threats\/cyber-threats-from-foreign-hackers\" target=\"_blank\" rel=\"noopener\">state-sponsored attacks<\/a>. It\u2019s a costly way to get to their prize. If you have something they want, you could be a target.<\/p>\n<p>They\u2019re <strong>advanced<\/strong>. No low-cost software bought on the <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/dark-web-monitoring\/29084\/\" target=\"_blank\" rel=\"noopener nofollow\">dark web<\/a> by do-it-yourself cybercriminals. They build their own sophisticated software for purposeful damage.<\/p>\n<p>They\u2019re <strong>persistent<\/strong>. They seek you as their target, hitting you with weeks or months of attacks until they break through your IT security defenses. Or they lie dormant for years until the time to attack. Once in, they conduct secret operations to find critical data. If they\u2019re determined, there\u2019s only so much that cybersecurity software can keep safe.<\/p>\n<p>And they\u2019re a serious <strong>threat<\/strong>. Their goals range from espionage to sabotage, to data theft for profit.<\/p>\n<h2>Threat attribution wins the threat intelligence race, but it\u2019s not for everyone<\/h2>\n<p>Threat attribution is a next-level solution, but it\u2019s not for every business. It\u2019s like choosing a car. What you need depends on your journey. A budget motor is fine for driving from A to B. In cybersecurity, that\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/endpoint-security\/\" target=\"_blank\" rel=\"noopener nofollow\">endpoint security<\/a>. If you\u2019re carrying precious cargo, a limousine may be a worthwhile investment. In cybersecurity, that\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">threat intelligence<\/a>.<\/p>\n<blockquote><p>If you need speed and the most high-tech engine to win the race, threat attribution is that fast-track race car. <\/p>\n<\/blockquote>\n<p>If you hold classified information that\u2019s interesting to a rival state, you\u2019re at greatest risk of an APT attack. National security and law enforcement agencies (like Interpol or the FBI) are most vulnerable. They have much to gain by uncovering who\u2019s hacking them. Sometimes APT attacks also target corporates, other government agencies and critical infrastructure like power plants and manufacturing.<\/p>\n<p>You don\u2019t have to be a big organization to be a target. If you\u2019re making components for a military plane, a less friendly state may want to know how you\u2019re making the rudder for counter-intelligence.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/supply-chain-attack-evolution\/32165\/\" target=\"_blank\" rel=\"noopener nofollow\">Supply chain attacks<\/a> are also on the rise. By hitting a laptop manufacturer, hackers can infect everyone in an organization. Then, when the time\u2019s right, they strike, cherry-picking who they spy on by hacking straight into their laptop.<\/p>\n<h2>Who are the threat actors?<\/h2>\n<p>APTs are a fast-growing \u2018industry.\u2019 These <a href=\"https:\/\/en.wikipedia.org\/wiki\/Threat_actor#:~:text=A%20threat%20actor%20or%20malicious,or%20security%20of%20another%20entity\" target=\"_blank\" rel=\"noopener nofollow\">threat actors<\/a> are not amateurs. They\u2019re super-organized crime workers. Some have different units for espionage, counter-intelligence and financial exploitation.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2018\/03\/07180244\/Lazarus_Under_The_Hood_PDF_final.pdf\">Lazarus<\/a> was the most significant threat actor in 2019. They attacked Sony Pictures Entertainment with a data-wipe in 2014 and made several attacks on South Korea. <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2019_advanced-persistent-threats-in-2020-abuse-of-personal-information-and-more-sophisticated-attacks-are-coming\" target=\"_blank\" rel=\"noopener nofollow\">APT trends in 2020<\/a> predict more sophisticated attacks using artificial intelligence (AI) and deep fakes to access personal data.<\/p>\n<h2>How does threat attribution work?<\/h2>\n<p>When one of the most damaging ever <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-ransomware\/34227\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> attacks <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ransomware-wannacry\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry hit in 2017<\/a>, a <a href=\"https:\/\/securelist.com\/wannacry-and-lazarus-group-the-missing-link\/78431\/\" target=\"_blank\" rel=\"noopener\">Google researcher tweeted cryptic code<\/a> showing similarities between WannaCry and 2015 malware attributed to Lazarus. This is threat attribution.<\/p>\n<blockquote><p>Identifying cybercriminals is forensic. It\u2019s deep detective work. <\/p>\n<\/blockquote>\n<p>You need to analyze and find clues that take you back to existing knowledge. By analyzing the attack\u2019s context, and nuances and languages deep in the code, researchers can reveal the threat actor\u2019s origins.<br>\n<img decoding=\"async\" class=\"aligncenter size-large wp-image-36032\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/06\/26053954\/188-C-Morgan-1024x768.jpg\" alt=\"threat attribution\" width=\"1024\" height=\"768\"><br>\nThese actors rarely leave a calling card, but they do leave evidence. We can analyze malware samples never seen before to find out if the actor is new, or an existing player in disguise.<\/p>\n<p>Like all forensic analysis, it\u2019s slow and painstaking. With highly sophisticated threats, it means reverse-engineering the attacks. It can take years, even for teams of the most skilled researchers. That\u2019s often enough time for attackers to achieve their goals.<\/p>\n<h2>How can we shorten the analysis time?<\/h2>\n<p>What if we could speed up the process? Faster attribution can shorten incident response times from hours to minutes, and reduce false positives.<\/p>\n<blockquote><p>To know what\u2019s bad, you need to know what\u2019s good. But to know what\u2019s good, you need experience. <\/p>\n<\/blockquote>\n<p>Kaspersky\u2019s Global Research and Analysis Team (GReAT) tracks over 600 APT actors and campaigns. To help the Information Security (InfoSec) community block APTs, they produce 120 or more subscriber reports each year and share highlights in quarterly <a href=\"https:\/\/securelist.com\/apt-trends-report-q1-2020\/96826\/\" target=\"_blank\" rel=\"noopener\">APT trends reports<\/a>. Profiling each threat actor can take years, building a database of everything you need to know about them.<\/p>\n<p>From this insight, Kaspersky developed one of the first solutions for automated threat attribution. It\u2019s like the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shazam_(application)\" target=\"_blank\" rel=\"noopener nofollow\">Shazam app<\/a> \u2013 that can identify the song you\u2019re humming by finding a match \u2013 for threat intelligence. By uploading a code sample to Kaspersky\u2019s Threat Attribution Engine, it matches previous attacks and APT groups in seconds. It analyzes the malware\u2019s \u2018genetics\u2019 to compare to \u2018genotypes:\u2019 known malware linked to a threat actor. This fast analysis can help those facing APT attacks to limit damage.<\/p>\n<p>We can\u2019t stop the flood of threats permeating our world, but we can build our defenses. Threat attribution is a new weapon in the arsenal for tackling organized cybercrime, and it could make it far harder for them to succeed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals don\u2019t leave a calling card, but they do leave evidence. Threat attribution matches their \u2018fingerprints\u2019 to help you respond and defend.<\/p>\n","protected":false},"author":2536,"featured_media":36030,"template":"","coauthors":[3604],"class_list":{"0":"post-36029","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-threat-intelligence","8":"emagazine-tag-apts","9":"emagazine-tag-threat-attribution"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/threat-attribution\/36029\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/threat-attribution\/22712\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/threat-attribution\/20805\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/36029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36030"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=36029"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=36029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}