How shape-shifting threat actors complicate attack attribution

This article has been indexed from CSO Online

The already difficult task of attributing a cybersecurity attack to a particular threat actor is made harder by the shape-shifting nature of threat groups. Despite the best efforts of researchers, some attackers may never be identified.

At last week’s VB2021 conference, cybersecurity analysts and researchers walked through the breadcrumbs they followed to identify the malicious actors behind the Colonial Pipeline, Sony Pictures, and Iran railway system attacks. These examples show why attribution is complicated and sometimes impossible.

To read this article in full, please click here

Read the original article: How shape-shifting threat actors complicate attack attribution