Under false flag: using technical artifacts for cyber attack attribution https://t.co/5Akt8pz9fU
Perfidy War Crime Prohibition of Perfidy https://t.co/WWuLtwvst4
Prohibition of Perfidy Improper Use of Flags or Military Emblems, Insignia or Uniforms of the Adversary The Blame Game. False Flags. War Crimes https://t.co/WWuLtwvst4
RT @itinsecure: Ciberseguridad. El reto de detectar la técnica de la "bandera falsa". Detalles en: #ciberlideraxgo https://t.co/E7ypkoz64i
Ciberseguridad. El reto de detectar la técnica de la "bandera falsa". Detalles en: #ciberlideraxgo https://t.co/E7ypkoz64i
4/6 "(...) Cyber #falseflags refer to tactics applied by cunning perpetrators in covert cyber attacks to deceive or misguide attribution attempts including the attacker’s origin, identity, movement, and exploitation" https://t.co/LauBHVHZu8
Skopik, F., Pahi, T. " Under false flag: using technical artifacts for cyber attack attribution. " Cybersecur 3, 8 (2020). https://t.co/5696pV9TGv
Read the article "Under false flag: using technical artifacts for cyber attack attribution". Very interesting article examining the challenges of attribution when the threat actor includes false flags intentionally and offering an approach to overcome it.
Un artículo que explica la estrategia de la "bandera falsa" (False Flag). Detalles en: #CiberLideraXgo https://t.co/E7ypkoz64i
As this report shows, false flags are easier to produce in the cyber world than in physical world. But I agree with you who say there needs to be an independent investigation of attributed hackers. We should not rely upon MS/Mitre data or my hunch. htt
Article on how, unlike forensic examination of physical evidence (DNA, fingerprints), identifying cyber-attackers can never be 100% guaranteed, & in final analysis, depends on subjective interpretation of the evidence, with variable % probability outco