Monday, February 29, 2016

Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums

“Pattern of life analysis” is an effective counter terrorism technique that can be applied to cyber threat intelligence. Using patterns to classify adversary behaviors rather than relying on distinct Internet handles, like “UglyGorilla” or “Hassan20,” cyber threat analysts are able to look across multiple handles, posts, forums, and social media sites to identify signals of malicious activity.
During the recent Kaspersky Security Analyst Summit Recorded Future CEO, Christopher Ahlberg, shared why we should organize the Web for analysis rather than search. “Attribution,” he explained, “is many times based on sloppy handle usage.” What if a threat actor is cautious? “Handle hopping,” the act of switching between user names, is easy for the threat actor who is conscious of leaving a trail of Internet breadcrumbs. In traditional searching, where the username trail dies off, the lead to the threat actor or group does also.
Putting patterns to work, Recorded Future conducted a sample analysis across 500 hacker forums to find interesting signals. They used natural language processing to identify posts around vulnerabilities and exploits.
Interestingly, found that in 98.8% of over 742,000 posts, the handles used were unique (even though it’s likely hackers used multiple handles to cover their tracks, and groups of hackers working together each had distinct handles).
While it’s easy to change handles, it’s less easy to change behavior. By clustering patterns, They were able to find similar behaviors among various handles and identify groups working around a particular vulnerability or exploit. Focusing on pattern analysis across user handles allowed us to see the pods who share similar interests and actions online.

3 comments:

  1. Its cool to hear of the work done by Recorded Futures. I love patters! I wish we could learn how they used natural language processing to find vulnerabilities through user posts. Thanks for sharing, very cool post.

    -Brett

    ReplyDelete
  2. A mathematical analysis of hacker(s) behavior and motivation are key areas of understanding their mindset. An algorithm for understanding life patterns of a hacker based on processing natural language will be a good technique. Do we know any such technique?.

    ReplyDelete
  3. A mathematical analysis of hacker(s) behavior and motivation are key areas of understanding their mindset. An algorithm for understanding life patterns of a hacker based on processing natural language will be a good technique. Do we know any such technique?.

    ReplyDelete