Converging Behaviors Across Threat Actors
Historically, threat intelligence analysts viewed adversaries as having particular, specific „fingerprints” or operational tendencies in cyber operations. While this perspective worked historically, subsequent evolution in adversary tradecraft and operational security has muddled matters significantly.
At present, adversaries coalesce around a common set of behaviours or tradecraft: credential phishing or exploitation of unpatched vulnerabilities, credential capture and re-use, and leveraging one of several post-exploitation frameworks, most notably Cobalt Strike. On the one hand, this makes threat intelligence and attribution significantly harder given the great convergence of tradecraft. On the other hand, defenders have the benefit of operating against a common set of techniques and behaviours to secure networks and evict adversaries.
In this presentation, we will explore the convergence of cyber operations, its implications for threat analysis and intelligence, and what this means for network defenders in a concrete fashion.
About the speaker
Joe Slowik
Read more …