Threat group attribution with open-source datasets
Case study: Reading between the lines of a press release. You're a threat analyst doing their job, reading the news — i t's December 13, 2020 . FireEye just announced that they identified the SolarWinds Orion solution being used by Russia as a backdoor initial access into the systems of all types of governments and organizations. The full scope of the breach is still unclear; 100s, 1000s, and probably more are impacted. Fast forward — It's now late January of 2021. C haos in the media has ensued over recent weeks, many individuals and even companies are claiming attribution to specific Russian groups using flimsy proof and no hard evidence. Finally, US officials share that it was "an Advanced Persistent Threat (APT) actor, likely Russian in origin" that is responsible for the SolarWinds attack, described as "an intelligence-gathering effort." ( CISA ) We look at 2 highlights, our key takeaways... – "likely Russian in origin" –