Page 248 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 248

Advanced threat intelligence platforms utilize entity graphing to visually map and correlate seemingly
            unrelated signals, revealing hidden connections. These interconnected graphs can expose relationships
            between threat actors, even when they use obscure data points. This high-fidelity intelligence can identify
            not  just  isolated  threat  artifacts  but  also  the  human  adversaries  orchestrating  malicious  campaigns.
            Understanding the identity of the individual behind the keyboard is as critical as understanding their
            Tactics, Techniques, and Procedures (TTPs).



            Historical Context: The Power of Signal Analysis

            The concept of analyzing signals for threat intelligence is not new. The National Security Agency (NSA)
            project labeled ThinThread (circa 1990s) aimed to analyze phone and email metadata to identify potential
            threats. ThinThread demonstrated the potential of analyzing seemingly disparate signals to gain critical
            insights.  The  core  component  of  ThinThread,  known  as  MAINWAY,  which  focused  on  analyzing
            communication  patterns,  was  eventually  deployed  and  became  a  key  part  of  the  NSA's  domestic
            surveillance program. This historical example illustrates the potential of analyzing seemingly disparate
            signals  to  gain  critical  insights  into  potential  threats,  a  principle  that  underpins  modern  identity  risk
            intelligence.



            Real-World Example: North Korean Cyber Espionage

            Recent events highlight the urgent need for identity-centric intelligence, particularly the numerous cases
            of North Korean intelligence operatives infiltrating companies by posing as remote IT workers. These
            highly  skilled  agents  create  elaborate  fake  personas  with  fabricated  online  presences,  counterfeit
            resumes, stolen personal data, and AI-generated profile pictures to secure employment. Once employed,
            they often exfiltrate data. In some cases, they diligently perform their IT work to avoid suspicion. U.S.
            investigators  have  corroborated  the  widespread  nature  of  this  tactic,  revealing  that  North  Korean
            nationals have fraudulently obtained employment by presenting themselves as citizens of other countries.
            These  operatives  create  synthetic  identities  to  pass  background  checks  and  interviews,  acquiring
            personal information to appear as proficient software developers or IT specialists. One North Korean
            hacker even secured a software developer position at a cybersecurity company using a stolen American
            identity and an AI-generated profile photo, deceiving HR and recruiters. In some instances, these actors
            exfiltrate sensitive data within days of employment. KnowBe4, a security training firm, discovered a newly
            hired engineer who was a North Korean operative downloading hacking tools onto the company network.
            The operative was only apprehended because of the company’s proactive monitoring systems.

            This  example  underscores  that  traditional  security  measures,  background  screenings,  and  network
            monitoring may be insufficient to detect these sophisticated threats. Intelligence that can unmask these
            malicious  actors  early  in  the  process  is  crucial,  highlighting  the  value  of  identity  risk  intelligence.
            Proactively  incorporating  identity  risk  signals  early  in  the  screening  process  can  help  organizations
            identify potential imposters before they gain network access. For example, an identity-centric approach
            might have flagged the KnowBe4 hire as high-risk before onboarding by uncovering inconsistencies or
            prior exposure of their personal data.






                                                                                                            248
   243   244   245   246   247   248   249   250   251   252   253