Home » News » How shape-shifting threat actors complicate attack attribution

How shape-shifting threat actors complicate attack attribution

The already difficult task of attributing a cybersecurity attack to a particular threat actor is made harder by the shape-shifting nature of threat groups. Despite the best efforts of researchers, some attackers may never be identified.

At last week’s VB2021 conference, cybersecurity analysts and researchers walked through the breadcrumbs they followed to identify the malicious actors behind the Colonial Pipeline, Sony Pictures, and Iran railway system attacks. These examples show why attribution is complicated and sometimes impossible.

To read this article in full, please click here

Leave a Reply

Your email address will not be published. Required fields are marked *