Leveraging OSINT to Track Cyber Threat Actors

preview_player
Показать описание
In the cyber threat intelligence world, OSINT is often synonymous with technical indicators and internet scanning tools. While these play a major role in tracking cyber threat actors (a.k.a. hackers), there are non-technical OSINT techniques that support tracking threat actors. Several common open sources leveraged in tracking threat actors include indictments, corporate registries, news and social media. There are several cases that demonstrate this notion. In particular, contextualising information operations based on postmortem social media accounts; using indictment and sanction announcements to pivot off and find information that has not been previously reported by the FBI; and using news media to expose an Iran-based threat actor targeting the technology sector. These cases are not only applicable to threat intelligence analysts, but law enforcement, investigative journalists, and similar investigative professions.

Curtis Hanson @cybershtuff, Threat Intelligence Analyst, PwC

#OSINTSummit
Рекомендации по теме
Комментарии
Автор

Simple yet very effective. Thanks for sharing the knowledge.

BobBob-qmbm