Identifying hackers is harder than you think

Hacker malicious

One of the main reasons why hackers and other malicious actors are so hard to locate is not the fact they're really good at hiding their location -- it is because they're exceptional when it comes to faking things. They fake their locations, their working hours, language, infrastructure, toolkits -- even their own groups.

Hackers are going extreme lengths to make sure people looking for them are actually in for a wild goose chase. These conclusions were released by security researchers at Kaspersky Lab who tried to tackle the issue of misleading both victims and security researchers.

"The attribution of targeted attacks is complicated, unreliable and subjective -- and threat actors increasingly try to manipulate the indicators researchers rely on, further muddying the waters. We believe that accurate attribution is often almost impossible", says Brian Bartholomew, senior security Researcher at Kaspersky Lab.

"Moreover, threat intelligence has deep and measurable value far beyond the question 'who did it'. There is a global need to understand the top predators in the malware ecosystem and to provide robust and actionable intelligence to the organizations that want it -- that should be our focus".

Things like timestamps, or language markers, even though they could be a valuable asset for finding hackers, are easily manipulated. Infrastructure and backend connections can be used to find their location, but only if they fail to properly anonymize their internet connections.

And finally, tools. Some use publicly available ones, while others go for their own, custom-built one. Those custom-built tools can be used to backtrack some malicious actors. Kaspersky Lab’s full report on the issue can be found on this link.

Published under license from ITProPortal.com, a Future plc Publication. All rights reserved.

Photo Credit: adike/Shutterstock

3 Responses to Identifying hackers is harder than you think

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.