Cyber Attribution
The idea of Cyber Attribution is
nothing new. This simply means
attributing an attack to a specific
group or individual.
This becomes harder when the attack comes
from someone who hides their tracks by
covering it up with another group's cyber
signature, language, methods, etc. Some of the
most notable examples are Stuxnet and
Shamoon.
Many people wondered "Who did this?" during both of these events, but
that question was never answered until recently with the release of
some documents by Edward Snowden which point towards yet another
revelation inside of 2013: The United States Government has been
working on software (with codenames like EgotisticalGiraffe) designed
to specifically mimic other Governments' malware signatures in order
to make them think they are attacking that Government.
This is known as an act of Cyber False Flagging, which has also
been called the "Second 9/11". The idea behind this is that you
make it look like your enemies are attacking you so the people
rise up and call for war against them. This may seem crazy to
some people but there actually was a bill proposed in Congress
last year ( HR 367 ) to completely do away with the US's
responsibility to be first responders during cyber attacks.
So now that we have all these facts about Cyber Attribution
let's talk about what makes this concept complicated: You
don't know who everyone is or what their motivations are,
sometimes it takes years just to figure out if two groups
are really one group pretending to be two separate ones or
if they are actually two different groups.
Sometimes the answer lies in the lies that you
tell yourself, sometimes it happens without
anyone realizing what happened, and
sometimes it reveals itself when no one is
looking for it.
It's true that attribution can be hard, but there are
some things to know about Cyber Attribution . If
you want to know if an act of cyberwarfare was
done by a specific group there are certain
aspects of evidence you must look at:
Technical Evidence (programs used, time frames involved, etc.)
· Logistical Evidence (where did funding come from? Where did the
attack take place?)
· Psychological Evidence (what language was used in the message at
hand? What is their known personality like?)
· Digital Evidence (how did the groups communicate and share
information before this incident?)
If you can prove each of these elements, then you'll have a better
case for attribution. For example: let's say your entire power grid
goes down at 8:00AM on a Tuesday and we know that hackers
from Eastern Europe were using Russian language to talk to
other countries in Eastern Europe during the time frames
involved so… chances are it was Russia who did it.
Attribution isn't always black and white though. Sometimes there
are gray areas where nations go against others covertly to help
achieve their goals without anyone knowing about it or even if
they know about it. There are also cases where two groups may
seem like they're working together but they're actually not,
because one group wants everyone to think that they are.
Sometimes the line gets blurred because of how much the
Internet is used to mask identities and other times it can be
blurry just because someone doesn't want to admit what
happened so you don't find all the answers right away. As
long as there's Cyber False Flagging in this world you will
never have perfect attribution… ever!

More Related Content

PDF
The devil is in the details
PDF
Backdoor Dreaming
PPTX
PDF
Miller Shrestha RightsCon2014: NLP and Violations Classification
PPTX
DOCX
Accurately Attributing the Sony Hack is More Important than Retaliating
PDF
A2 Media Project Pitch
PPTX
Little Brother Scrapbook
The devil is in the details
Backdoor Dreaming
Miller Shrestha RightsCon2014: NLP and Violations Classification
Accurately Attributing the Sony Hack is More Important than Retaliating
A2 Media Project Pitch
Little Brother Scrapbook

What's hot (11)

PPTX
Hackers final
PPTX
Hackers
PPTX
Espionage
PPTX
Little brother presentation.5.30.13
PPTX
Creepy tool
PPTX
Snowden -Hero OR Traitor
PPTX
Ed Snowden: hero or villain? And the implications for media and democracy
PDF
Mensworldhq.com what happens on the dark web
DOCX
'Cyberwar will not take place' Discuss
PDF
Causes of the Growing Conflict Between Privacy and Security
Hackers final
Hackers
Espionage
Little brother presentation.5.30.13
Creepy tool
Snowden -Hero OR Traitor
Ed Snowden: hero or villain? And the implications for media and democracy
Mensworldhq.com what happens on the dark web
'Cyberwar will not take place' Discuss
Causes of the Growing Conflict Between Privacy and Security
Ad

Similar to Cyber Attribution (20)

PDF
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PDF
Reliability not Reliance.
PDF
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
PDF
s4c.paper2010
PDF
USSTRATCOM Cyber & Space 2011 Herbert Lin
PDF
China Cyber
PPTX
cyber crime
PDF
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
PDF
Cyber warfare capabiliites : A Reality Check
PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PDF
The Hacked World Order By Adam Segal
PDF
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
PDF
Cyber Security Conference - Rethinking cyber-threat
DOCX
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
DOCX
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
PPTX
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
PDF
Challenges from the Cyber Domain: Cyber Security and Human Rights
PPTX
Cyber Terrorism
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Reliability not Reliance.
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
s4c.paper2010
USSTRATCOM Cyber & Space 2011 Herbert Lin
China Cyber
cyber crime
Changing Domains - Cyber and Information Domains 2024 lecture.pdf
Cyber warfare capabiliites : A Reality Check
Cyber warfare Threat to Cyber Security by Prashant Mali
The Hacked World Order By Adam Segal
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Cyber Security Conference - Rethinking cyber-threat
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Challenges from the Cyber Domain: Cyber Security and Human Rights
Cyber Terrorism
Ad

More from Data Source (20)

PDF
TheAgencyTLV_ הפתרון המקצועי והאמין לניהול דירות בישראל.pdf
PDF
AI を活用した次世代小売ソリューション:未来のショッピング体験を革新するスマートテクノロジーの力
PDF
タイトル:人類の未来を加速する「AIチップ」:革新的技術が切り開く無限の可能性とその世界
PDF
Videoverbesserung KI_ Die Revolution der Bildqualität durch künstliche Intell...
PDF
Automatische Optische Inspektion_ Präzision und Effizienz in der Qualitätskon...
PDF
Property Development Companies in Israel_ Unlocking Opportunities in a Growin...
PDF
近年急速に進化するai デバイスの仕組みと応用事例、未来の展望を詳しく解説します
PDF
AOI検査とは何か、その基本的な仕組みや種類、メリット、課題、そして最新技術の動向まで詳しく幅広く解説し、製造現場での重要性を具体的に理解していただきます。
PDF
Videoverbesserung KI_ Die Zukunft der Videoqualität neu definiert.pdf
PDF
Revolution der Medien_ Wie KI Videoverbesserung die Zukunft der Videotechnolo...
PDF
KI Edge – Intelligenz am Rand_ Echtzeit, Effizienz, Evolution.pdf
PDF
KI Chips – Die Gehirne der Künstlichen Intelligenz.pdf
PDF
AIの心臓部を支える力 ― ニューラルネットワークプロセッサの進化と未来.pdf
PDF
セマンティック セグメンテーションで世界を理解する:AIが捉える“意味”のピクセル.pdf
PDF
Zukunft der Mobilität mit Intelligenten Transportsystemen.pdf
PDF
Driving B2B Success with the Right Digital Marketing Agency
PPTX
Driving B2B Success with the Right Digital Marketing Agency
PDF
ConWize Construction Estimation Software
PPTX
Transforming Retail Communications: The Key to Success
PPTX
IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...
TheAgencyTLV_ הפתרון המקצועי והאמין לניהול דירות בישראל.pdf
AI を活用した次世代小売ソリューション:未来のショッピング体験を革新するスマートテクノロジーの力
タイトル:人類の未来を加速する「AIチップ」:革新的技術が切り開く無限の可能性とその世界
Videoverbesserung KI_ Die Revolution der Bildqualität durch künstliche Intell...
Automatische Optische Inspektion_ Präzision und Effizienz in der Qualitätskon...
Property Development Companies in Israel_ Unlocking Opportunities in a Growin...
近年急速に進化するai デバイスの仕組みと応用事例、未来の展望を詳しく解説します
AOI検査とは何か、その基本的な仕組みや種類、メリット、課題、そして最新技術の動向まで詳しく幅広く解説し、製造現場での重要性を具体的に理解していただきます。
Videoverbesserung KI_ Die Zukunft der Videoqualität neu definiert.pdf
Revolution der Medien_ Wie KI Videoverbesserung die Zukunft der Videotechnolo...
KI Edge – Intelligenz am Rand_ Echtzeit, Effizienz, Evolution.pdf
KI Chips – Die Gehirne der Künstlichen Intelligenz.pdf
AIの心臓部を支える力 ― ニューラルネットワークプロセッサの進化と未来.pdf
セマンティック セグメンテーションで世界を理解する:AIが捉える“意味”のピクセル.pdf
Zukunft der Mobilität mit Intelligenten Transportsystemen.pdf
Driving B2B Success with the Right Digital Marketing Agency
Driving B2B Success with the Right Digital Marketing Agency
ConWize Construction Estimation Software
Transforming Retail Communications: The Key to Success
IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Architecture types and enterprise applications.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
The various Industrial Revolutions .pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Five Habits of High-Impact Board Members
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
2018-HIPAA-Renewal-Training for executives
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
sbt 2.0: go big (Scala Days 2025 edition)
UiPath Agentic Automation session 1: RPA to Agents
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Architecture types and enterprise applications.pdf
Flame analysis and combustion estimation using large language and vision assi...
OpenACC and Open Hackathons Monthly Highlights July 2025
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
The various Industrial Revolutions .pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
CloudStack 4.21: First Look Webinar slides
sustainability-14-14877-v2.pddhzftheheeeee
The influence of sentiment analysis in enhancing early warning system model f...
Five Habits of High-Impact Board Members
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Module 1.ppt Iot fundamentals and Architecture
STKI Israel Market Study 2025 version august

Cyber Attribution

  • 2. The idea of Cyber Attribution is nothing new. This simply means attributing an attack to a specific group or individual.
  • 3. This becomes harder when the attack comes from someone who hides their tracks by covering it up with another group's cyber signature, language, methods, etc. Some of the most notable examples are Stuxnet and Shamoon.
  • 4. Many people wondered "Who did this?" during both of these events, but that question was never answered until recently with the release of some documents by Edward Snowden which point towards yet another revelation inside of 2013: The United States Government has been working on software (with codenames like EgotisticalGiraffe) designed to specifically mimic other Governments' malware signatures in order to make them think they are attacking that Government.
  • 5. This is known as an act of Cyber False Flagging, which has also been called the "Second 9/11". The idea behind this is that you make it look like your enemies are attacking you so the people rise up and call for war against them. This may seem crazy to some people but there actually was a bill proposed in Congress last year ( HR 367 ) to completely do away with the US's responsibility to be first responders during cyber attacks.
  • 6. So now that we have all these facts about Cyber Attribution let's talk about what makes this concept complicated: You don't know who everyone is or what their motivations are, sometimes it takes years just to figure out if two groups are really one group pretending to be two separate ones or if they are actually two different groups.
  • 7. Sometimes the answer lies in the lies that you tell yourself, sometimes it happens without anyone realizing what happened, and sometimes it reveals itself when no one is looking for it.
  • 8. It's true that attribution can be hard, but there are some things to know about Cyber Attribution . If you want to know if an act of cyberwarfare was done by a specific group there are certain aspects of evidence you must look at:
  • 9. Technical Evidence (programs used, time frames involved, etc.) · Logistical Evidence (where did funding come from? Where did the attack take place?) · Psychological Evidence (what language was used in the message at hand? What is their known personality like?) · Digital Evidence (how did the groups communicate and share information before this incident?)
  • 10. If you can prove each of these elements, then you'll have a better case for attribution. For example: let's say your entire power grid goes down at 8:00AM on a Tuesday and we know that hackers from Eastern Europe were using Russian language to talk to other countries in Eastern Europe during the time frames involved so… chances are it was Russia who did it.
  • 11. Attribution isn't always black and white though. Sometimes there are gray areas where nations go against others covertly to help achieve their goals without anyone knowing about it or even if they know about it. There are also cases where two groups may seem like they're working together but they're actually not, because one group wants everyone to think that they are.
  • 12. Sometimes the line gets blurred because of how much the Internet is used to mask identities and other times it can be blurry just because someone doesn't want to admit what happened so you don't find all the answers right away. As long as there's Cyber False Flagging in this world you will never have perfect attribution… ever!