Page 322 - Cyber Defense eMagazine September 2025
P. 322

Challenges  of  Profiling  Threat  Actors?  Confusion  is  one  of  the  most  powerful  weapons  used  by
            adversaries and threat actors in cyberspace. Many other factors can make analysts feel trapped in a
            maze where everything looks the same and there’s no way out. A question arises: Can we track attackers
            or a specific group by comparing their code to that of another cybercrime group? Unfortunately, the
            answer is often hypothetical rather than definite. Most cyber attack groups tend to copy techniques and
            methods  from  other  groups,  including  coding  styles.  This  makes  it  harder  to  attribute  attacks  with
            certainty:



            Switching Languages: Adversaries may switch languages when communicating across borders. This
            is commonly seen in forums and dark markets during discussions.

            Manipulating Timestamps: Attackers can change timestamps and add false information in the metadata
            of programs or files. This can be used for a targeted attack.

            Mimicking Code: Malicious code for macros or payloads may be designed to look like the behavior of
            another group’s code from a different country.

            Changing Time Zones: Attackers may adjust time zones to match the local time of another country. This
            can confuse analysts about the actual source of the attack.

            Using Multiple Proxies: Attackers use several proxies to hide the true source of their attacks. This helps
            obscure their location.
            Domain Registration: A domain may be registered in someone else’s name or in a different country.
            This is done to conceal the attacker’s identity.



            What are their techniques? Adversaries use a variety of techniques and operational methods that can
            differ greatly from one group to another. For example, financially motivated groups like FIN tend to target
            the economic and banking sectors. On the other hand, hacktivist or Leaktivist groups often focus on the
            public sector, motivated more by political or ideological reasons than by financial gain. This difference
            also applies to Advanced Persistent Threats (APTs). What sets these groups apart is not just their goals
            but also their behavior patterns.

            Consider cybercriminal factions known as "Spiders." Their main goal is to disrupt or disable systems for
            financial gain. One of the biggest challenges for cybersecurity researchers is attribution. As discussed in
            the first part of this series, a group can change its identity, tools, and motives over time. When the players
            change, even if the techniques and tools stay the same, everything else objectives, motivations, and
            incentives can shift dramatically. An APT group might start by trying to extract sensitive intelligence but
            later switch to destructive actions. Similarly, a financially motivated group like the Spiders may suddenly
            pursue political or ideological aims. In this article, we will examine these patterns with minimal false
            positives. Later, we will look at why this approach leads to fewer mistakes.








            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          322
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   317   318   319   320   321   322   323   324   325   326   327