MIT Logo

Under false flag: using technical artifacts for cyber attack attribution

Abstract:

There is often a lack of accountability when it comes to the perpetration of cyberattacks. Those responsible are often able to get away without proper prosecution. The only time that investigating the perpetrators of cyberattacks is of chief interest and importance is with regards to competing nation states and relevant espionage concerns. One of the best ways certain perpetrators get away with cyberattacks are through the usage of “False Flag” campaigns, in which a perpetrator uses “covert tactics to hide traces or blame others”. This paper outlines major attack vectors from “False Flag” campaigns that leave few traces and inform us of what techniques and what questions are important for solving these cases.

Author:
Florian Skopik & Timea Pahi
Year:
2020
Domain: ,
Dimension:
Region:
Data Type: , , ,
MIT Political Science
MIT Political Science
ECIR
GSS