SlideShare a Scribd company logo
1 of 28
FROMADVANCED
PERSISTENTTHREATS
TO"ADVANCED
PERSISTENT
MANIPULATORS":
THEEVOLVINGCYBER
DEFENSEBATTLEFIELD
iDefense Threat Intelligence
Mei Nelson
AS ADVANCED PERSISTENT THREATS
CONTINUE THEIR WORK...
Copyright © 2019 Accenture. All rights reserved. 2
Source: US-CERT Source: FBI
Copyright © 2019 Accenture. All rights reserved. 3
A NEW BREED OF THREAT
EMERGES:
Copyright © 2019 Accenture. All rights reserved. 4
ADVANCED
PERSISTENT
MANIPULATORS
“An actor or combination
of actors perpetrating
an extended,
sophisticated, multi-
platform,multi-media
informationattack on a
specified target”
— CLINT WATTS, THE ALLIANCE FOR SECURING DEMOCRACY
ADVANCED PERSISTENT THREATS VS
ADVANCED PERSISTENT MANIPULATORS
Copyright © 2019 Accenture. All rights reserved. 5
APTs APMs
Main Characteristics Organized, resourceful,
well-funded, defined
objectives, conducting
network operations
Organized, resourceful, well-funded,
defined objectives, conducting
information operations across all social
media platforms
Goals Strategic advantage, profit Influence audiences, discredit
adversaries, enlist allies and agents, incite
fear and provoke conflict, distort reality
Methods Network intrusion,
vulnerability exploitation
Use inauthentic accounts, create
forgeries, stage real world provocations
Actors State-sponsored actors,
cybercriminals, corporate
espionage actors
Activists, extremist groups, state-
sponsored actors, political campaigns,
lobbyists, businesses, or celebrities
ADVANCED PERSISTENT
MANIPULATORS
BEYONDSOCIALMEDIACopyright © 2019 Accenture. All rights reserved.
WARFARE&
DECEPTION
兵者,詭道也。故能而示之不能,用而
示之不用,近而示之遠,遠而示之近。
All warfare is based on deception. Hence, when
we are able to attack, we must seem unable;
when using our forces, we must appear inactive;
when we are near, we must make the enemy
believe we are far away; when far away, we must
make him believe we are near.
7
Source: Amazon
Copyright © 2019 Accenture. All rights reserved.
INFORMATIONOPERATIONS
&DECEPTION
The Set Up: a novel of espionage
“I will force the enemy to take our strength for
weakness, and our weakness for strength, and
thus will turn his strength into weakness.”
- A fictional KGB officer in charge of
disinformation operations
8
Source: Abebooks.co.uk
Copyright © 2019 Accenture. All rights reserved.
Disinformation
Propaganda
Misinformation
9Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
THREE TYPES & THREE DIMENSIONS
INFORMATION OPERATIONS
GOALS: THE “D” WORDS
10
DIVIDE DISCREDIT DISTRACT DENY
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
METHODS
11
“WHITE” METHOD
Broadcasting one’s
message openly
through state
media
“GRAY” METHOD
Placing information in
other sympathetic
media
“BLACK” METHOD
Using hackers,
trolls, and
honeypots
Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
TARGET AUDIENCES
12
Targets of Non-state actors
• Own group members or
rival groups
• Law enforcement
• Politicians
• General public
Targets of State actors
• One’s own citizens
• Adversary country’s
politicians, military,
bureaucrats
• Various groups within
the adversary country
• Mass opinion
Copyright © 2019 Accenture. All rights reserved.
13
• Flooding the media with multiple versions of a story to
confuse the audience
• Publicizing scandalous information to discredit a critic
or adversary
• Distracting world opinion from negative information,
by highlighting or even creating some other crisis or
scandal
• Using inauthentic social media profiles to inflame real-
world violence by publicizing rallies of rival groups
Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
TACTICS
14
CASE STUDY: #MACRONLEAKS (PART I)
• Disinformation campaign: rumors,
fake news, forged documents
• Offensive network intrusion:
computers of Macron’s campaign
staff
• Spreading stolen data using trolls
and bots
Source: Reuters
Copyright © 2019 Accenture. All rights reserved.
15
CYBER-ENABLED INFORMATION OPERATIONS
Broadly
Any information operations taking place in
cyberspace, including in online media and
social media
Narrowly
Information operations leveraging offensive
cyber threat activity such as subverting
secure system
Copyright © 2019 Accenture. All rights reserved.
16
CYBER-ENABLED INFORMATION OPERATIONS
Cyberthreat Activities
+
Disinformation Tradecraft
State-sponsored
Copyright © 2019 Accenture. All rights reserved.
17
CYBER-ENABLED INFORMATION OPERATIONS
Hacktivism
Non-state actors for
ideological purposes
State-controlled
hacktivism using false
personas
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: #MACRONLEAKS (PART II)
1818
18
• Spear phishing campaign
• Hacktivist personas
• Social media bots
• Imagery board: 4chan
SNAKEMACKEREL (APT 28)
Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
CASE STUDY: THE INTEGRITY INITIATIVE
19
Objective: Disinformation
& Counternarrative
• Perpetrator:
”Anonymous”
Likely state-controlled
hacktivist persona
• Six Leaks from Nov. 5th
2018
• Financial focus? – No,
but it can happen
Copyright © 2019 Accenture. All rights reserved.
Source: the CyberGuerrilla website
CASE STUDY: FANCY BEARS’ HACK TEAM
20
Source: Fancy Bears’ Hack Team website
Copyright © 2019 Accenture. All rights reserved.
21
SKATE
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: ENDLESS MAYFLY & OPERATION
NEWSCASTER
1. Used typo-squatted domains to create
inauthentic websites
2. Promoted these domains on social
media platforms using inauthentic
personas
3. Hosted malicious mobile applications
4. Leveraged “ephemeral disinformation”
– Burn After Reading
21
22
DEEPFAKE USED
AS
DISINFORMATION
Copyright © 2019 Accenture. All rights reserved.
Source: Scribd
WHEREISTHIS
HEADING?
23Copyright © 2019 Accenture. All rights reserved.
24Copyright © 2019 Accenture. All rights reserved. Source: New York Times
25
SUGGESTIONS
• Follow geopolitical events
• Set social media policies
• Filter inauthentic accounts
• Verify claims
• Investigate information sources
Copyright © 2019 Accenture. All rights reserved.
26
https://www.accenture.com/_acnmedia/pdf-107/accenture-security-cyber.pdf
Copyright © 2019 Accenture. All rights reserved.
LEGAL NOTICE & DISCLAIMER
© 2019 Accenture.
Accenture Security
Accenture Security helps organizations build resilience from the inside out, so they can confidently focus
on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry
understanding across client value chains and services that span the security lifecycle, Accenture
protects organizations’ valuable assets, end-to-end. With services that include strategy and risk
management, cyber defense, digital identity, application security and managed security, Accenture
enables businesses around the world to defend against known sophisticated threats, and the unknown.
Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
This document is produced by consultants at Accenture as general guidance. It is not intended to
provide specific advice on your circumstances. If you require advice or further details on any matters
referred to, please contact your Accenture representative.
The opinions, statements, and assessments in this report are solely those of the individual author(s) and
do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or
affiliates.

More Related Content

What's hot

Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
 

What's hot (20)

Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 
Accenture Media & Entertainment Industry 2021 - The Consumer Media Value Play
Accenture Media & Entertainment Industry 2021 - The Consumer Media Value PlayAccenture Media & Entertainment Industry 2021 - The Consumer Media Value Play
Accenture Media & Entertainment Industry 2021 - The Consumer Media Value Play
 
Future of Work: Heather McGowan
Future of Work: Heather McGowan Future of Work: Heather McGowan
Future of Work: Heather McGowan
 
OECD Digital Economy Outlook 2020: Key findings
OECD Digital Economy Outlook 2020: Key findingsOECD Digital Economy Outlook 2020: Key findings
OECD Digital Economy Outlook 2020: Key findings
 
Swiss Re Reinsurance Solutions - Claims Automated Rules Engine – Insurer Inno...
Swiss Re Reinsurance Solutions - Claims Automated Rules Engine – Insurer Inno...Swiss Re Reinsurance Solutions - Claims Automated Rules Engine – Insurer Inno...
Swiss Re Reinsurance Solutions - Claims Automated Rules Engine – Insurer Inno...
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
The Industrialist: Trends & Innovations - October 2022
The Industrialist: Trends & Innovations - October 2022The Industrialist: Trends & Innovations - October 2022
The Industrialist: Trends & Innovations - October 2022
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Innovating for growth: Innovation 2.0 - A spiral approach to business model i...
Innovating for growth: Innovation 2.0 - A spiral approach to business model i...Innovating for growth: Innovation 2.0 - A spiral approach to business model i...
Innovating for growth: Innovation 2.0 - A spiral approach to business model i...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Data-Driven Operating Models Enabled by Process Mining
Data-Driven Operating Models Enabled by Process MiningData-Driven Operating Models Enabled by Process Mining
Data-Driven Operating Models Enabled by Process Mining
 
PwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through ExecutionPwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through Execution
 
Growth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | AccentureGrowth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | Accenture
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 

Similar to [CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators": The Evolving Cyber Defense Battlefield by Mei Nelson

Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
REVULN
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
Frank Smilda
 
0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf
ThiagoHenrique751166
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 

Similar to [CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators": The Evolving Cyber Defense Battlefield by Mei Nelson (20)

Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
FPF Annual Report 2018
FPF Annual Report 2018FPF Annual Report 2018
FPF Annual Report 2018
 
Facebook
FacebookFacebook
Facebook
 
0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 

More from CODE BLUE

[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Recently uploaded (20)

Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 

[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators": The Evolving Cyber Defense Battlefield by Mei Nelson

  • 2. AS ADVANCED PERSISTENT THREATS CONTINUE THEIR WORK... Copyright © 2019 Accenture. All rights reserved. 2 Source: US-CERT Source: FBI
  • 3. Copyright © 2019 Accenture. All rights reserved. 3 A NEW BREED OF THREAT EMERGES:
  • 4. Copyright © 2019 Accenture. All rights reserved. 4 ADVANCED PERSISTENT MANIPULATORS “An actor or combination of actors perpetrating an extended, sophisticated, multi- platform,multi-media informationattack on a specified target” — CLINT WATTS, THE ALLIANCE FOR SECURING DEMOCRACY
  • 5. ADVANCED PERSISTENT THREATS VS ADVANCED PERSISTENT MANIPULATORS Copyright © 2019 Accenture. All rights reserved. 5 APTs APMs Main Characteristics Organized, resourceful, well-funded, defined objectives, conducting network operations Organized, resourceful, well-funded, defined objectives, conducting information operations across all social media platforms Goals Strategic advantage, profit Influence audiences, discredit adversaries, enlist allies and agents, incite fear and provoke conflict, distort reality Methods Network intrusion, vulnerability exploitation Use inauthentic accounts, create forgeries, stage real world provocations Actors State-sponsored actors, cybercriminals, corporate espionage actors Activists, extremist groups, state- sponsored actors, political campaigns, lobbyists, businesses, or celebrities
  • 7. WARFARE& DECEPTION 兵者,詭道也。故能而示之不能,用而 示之不用,近而示之遠,遠而示之近。 All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near. 7 Source: Amazon Copyright © 2019 Accenture. All rights reserved.
  • 8. INFORMATIONOPERATIONS &DECEPTION The Set Up: a novel of espionage “I will force the enemy to take our strength for weakness, and our weakness for strength, and thus will turn his strength into weakness.” - A fictional KGB officer in charge of disinformation operations 8 Source: Abebooks.co.uk Copyright © 2019 Accenture. All rights reserved.
  • 9. Disinformation Propaganda Misinformation 9Copyright © 2019 Accenture. All rights reserved. INFORMATION OPERATIONS THREE TYPES & THREE DIMENSIONS
  • 10. INFORMATION OPERATIONS GOALS: THE “D” WORDS 10 DIVIDE DISCREDIT DISTRACT DENY Copyright © 2019 Accenture. All rights reserved.
  • 11. DISINFORMATION OPERATIONS METHODS 11 “WHITE” METHOD Broadcasting one’s message openly through state media “GRAY” METHOD Placing information in other sympathetic media “BLACK” METHOD Using hackers, trolls, and honeypots Copyright © 2019 Accenture. All rights reserved.
  • 12. INFORMATION OPERATIONS TARGET AUDIENCES 12 Targets of Non-state actors • Own group members or rival groups • Law enforcement • Politicians • General public Targets of State actors • One’s own citizens • Adversary country’s politicians, military, bureaucrats • Various groups within the adversary country • Mass opinion Copyright © 2019 Accenture. All rights reserved.
  • 13. 13 • Flooding the media with multiple versions of a story to confuse the audience • Publicizing scandalous information to discredit a critic or adversary • Distracting world opinion from negative information, by highlighting or even creating some other crisis or scandal • Using inauthentic social media profiles to inflame real- world violence by publicizing rallies of rival groups Copyright © 2019 Accenture. All rights reserved. INFORMATION OPERATIONS TACTICS
  • 14. 14 CASE STUDY: #MACRONLEAKS (PART I) • Disinformation campaign: rumors, fake news, forged documents • Offensive network intrusion: computers of Macron’s campaign staff • Spreading stolen data using trolls and bots Source: Reuters Copyright © 2019 Accenture. All rights reserved.
  • 15. 15 CYBER-ENABLED INFORMATION OPERATIONS Broadly Any information operations taking place in cyberspace, including in online media and social media Narrowly Information operations leveraging offensive cyber threat activity such as subverting secure system Copyright © 2019 Accenture. All rights reserved.
  • 16. 16 CYBER-ENABLED INFORMATION OPERATIONS Cyberthreat Activities + Disinformation Tradecraft State-sponsored Copyright © 2019 Accenture. All rights reserved.
  • 17. 17 CYBER-ENABLED INFORMATION OPERATIONS Hacktivism Non-state actors for ideological purposes State-controlled hacktivism using false personas Copyright © 2019 Accenture. All rights reserved.
  • 18. CASE STUDY: #MACRONLEAKS (PART II) 1818 18 • Spear phishing campaign • Hacktivist personas • Social media bots • Imagery board: 4chan SNAKEMACKEREL (APT 28) Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
  • 19. CASE STUDY: THE INTEGRITY INITIATIVE 19 Objective: Disinformation & Counternarrative • Perpetrator: ”Anonymous” Likely state-controlled hacktivist persona • Six Leaks from Nov. 5th 2018 • Financial focus? – No, but it can happen Copyright © 2019 Accenture. All rights reserved. Source: the CyberGuerrilla website
  • 20. CASE STUDY: FANCY BEARS’ HACK TEAM 20 Source: Fancy Bears’ Hack Team website Copyright © 2019 Accenture. All rights reserved.
  • 21. 21 SKATE Copyright © 2019 Accenture. All rights reserved. CASE STUDY: ENDLESS MAYFLY & OPERATION NEWSCASTER 1. Used typo-squatted domains to create inauthentic websites 2. Promoted these domains on social media platforms using inauthentic personas 3. Hosted malicious mobile applications 4. Leveraged “ephemeral disinformation” – Burn After Reading 21
  • 22. 22 DEEPFAKE USED AS DISINFORMATION Copyright © 2019 Accenture. All rights reserved. Source: Scribd
  • 23. WHEREISTHIS HEADING? 23Copyright © 2019 Accenture. All rights reserved.
  • 24. 24Copyright © 2019 Accenture. All rights reserved. Source: New York Times
  • 25. 25 SUGGESTIONS • Follow geopolitical events • Set social media policies • Filter inauthentic accounts • Verify claims • Investigate information sources Copyright © 2019 Accenture. All rights reserved.
  • 27.
  • 28. LEGAL NOTICE & DISCLAIMER © 2019 Accenture. Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security. This document is produced by consultants at Accenture as general guidance. It is not intended to provide specific advice on your circumstances. If you require advice or further details on any matters referred to, please contact your Accenture representative. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates.