Cyber Attribution: Campaigns and renegades
- Dr. Samuel Liles
UNCLASSIFIED
Cyber Attribution: Campaigns and renegades Dr. Samuel Liles - - PowerPoint PPT Presentation
UNCLASSIFIED Cyber Attribution: Campaigns and renegades Dr. Samuel Liles UNCLASSIFIED Ca Cavea eats: The following represents my research over many years and none of it occurred while a federal government employee. While every effort has
UNCLASSIFIED
Ca Cavea eats: The following represents my research over many years and none of it occurred while a federal government
accurate portrayal of events within this presentation some details may be omitted due to the research topic. Opinions, conjecture, or observations are those of the presenter and should not be construed to be official policies of opinions of The Department of Homeland Security, The Federal Government, or the companies who provided primary and secondary source materials. A bibliography at the end of this presentation covers past and current discussion on the topic but is not an exhaustive example of the topic.
UNCLASSIFIED
UNCLASSIFIED
xxx
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Diagram by Sam Liles
UNCLASSIFIED
UNCLASSIFIED
Diagram by Sam Liles
UNCLASSIFIED
UNCLASSIFIED
Diagram by Sam Liles
Diagram by Sam Liles
UNCLASSIFIED
Diagram by Sam Liles
UNCLASSIFIED
UNCLASSIFIED
Diagram by Sam Liles. Concepts supported by work of Ronald Kurtz
UNCLASSIFIED
Boom
Persistence Privilege Escalation Defense Evasion Credential Access
Host EnumerationLateral Movement Execution C2 Exfiltration Command and Control Installation
Reconnaissance WeaponizationDeliver y Actions on Objective Preparation Engagement Presence Effect/Consequences
DNI Framework
Cyber Kill Chain MITRE ATT&CK NSA TAO
Reconnaissance Initial Exploitation Establish Persistence Install Tools Move Laterally Collect Exfil Exploit Exploitation External Actions Before Intrusion Pre-Execution Actions Operational A - Actions Internal Actions: “After Intrusions” Plan Activity Deploy Capability Control Deny Access Conduct Research & Analysis Interact with Target Hide Consume Resources Develop Resources & Capabilities Exploit Vulnerabilities Expand Alter/Manipulate Computer, Network, or System Behavior Conduct Reconnaissance Deliver Payload Refine Targeting Extract Data Stage Operational Tools & Capabilities Establish Persistence Destroy HW/SW/DATA Initiate Operations Enable Other Operations
Layer 1 Stages Layer 2 Objectives
UNCLASSIFIED
Diagram by Sam Liles
UNCLASSIFIED
Source: Attribution of cyber adversaries http://selil.com/archives/6791
UNCLASSIFIED
Evidence Required Time to Level of Attribution Event Happens
Possible Probable Provable
Motive, means,
IOCs: IP, Hash, URL, method, time, etc. Crypto, non- repudiation, multi- mode sensing, direct
Abductive reasoning, most reasonable explanation given current evidence
Deductive reasoning , Man -> Mortal Socrates -> Man Therefore, Socrates -> Mortal
Inductive reasoning, given water is wet, if I am wet, it is likely water.
Switches back and forth
Adversary Capability
Infrastructure
Victim Meta-Features Timestamp Phase Result Direction Methodology Resources
Attribution UNCLASSIFIED
Source: Luke in the sky with diamonds https://www.threatconnect.com/blog/diamond-model-threat-intelligence-star-wars/
UNCLASSIFIED
intrusion but not of attribution
framework
category), a deployed capability by an adversary, and an infrastructure both of which are indicative of IOCs
categorized by DNI framework, type of compromise, and time of compromise (even if a window)
depicted by threads within one victim infrastructure that becomes unique pattern of TTP
starting point for further investigation of adversary capability
domains, SSL certificates, ASNs, associated physical/logical locations, passive DNS to locate other infrastructure/victims)
multiple events because it easier)
attribution admit magic happens, utilize known answer to back into unknowable solution, but be wary of this
Adversary Infrastructure Victim Meta-Features Timestamp Phase Result Direction Methodology Resources Capability
Some background https://selil.com/archives/6791
UNCLASSIFIED
Thread 1 Thread 2 Thread 3 Thread 4 Preparation Engagement Presence Effect Consequences Victim 1 Victim 1 Victim 2 Victim ?
Boom
A I C V A B C D E F A & C are the same victim B & D are the same victim B & C share the same attack infrastructure C & D saw the same capability D & E & F saw the same attack infrastructure UNCLASSIFIED
UNCLASSIFIED
suggested by Caltagirone, Pendergast, and Betz may be suspect.
policy, National Academies Press, 2010
will bring something to the crime scene and leave with something from it. In cyber network defense examples include malware, internet protocol addresses, log files, netflow data, and other artifacts (https://en.wikipedia.org/wiki/Locard%27s_exchange_principle)
2013
reasoning” American Political Science Reivew, Volume 79, December 1985
workshop on deterring cyber-attacks: Informing strategies and developing
UNCLASSIFIED
Journal of Political Science, Vol 0 NO 0, 2011, pp1-20 (pre-print copy used)
(https://en.wikipedia.org/wiki/Confirmation_bias)
(https://en.wikipedia.org/wiki/False_flag)
https://www.usenix.org/conference/enigma2016
Enigma Conference https://www.schneier.com/blog/archives/2016/02/nsas_tao_on_i nt.html
Hackers https://www.youtube.com/watch?v=bDJb8WOJYdA
https://attack.mitre.org/wiki/Main_Page
Document released 2013 pages 26—30
UNCLASSIFIED