Is there any way organizations can determine if seemingly separate attacks are related (e.g., sent from the same...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
attacker or criminal organization)? And if so, are there any benefits to actually linking attacks in such a way, or is it ultimately insignificant as long as the attacks are stopped?
Ask the Expert
SearchSecurity expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email . (All questions are anonymous.)
An organization can determine if seemingly separate attacks are related by using attack attribution analysis techniques and comparing the technical details of the attacks.
Many times these tools and techniques leave telltale network or system signatures that can be used to identify an attacker. For example, a system sending IP traffic to another system using an unidentified and encrypted protocol on a specific port signature could be used to check other parts of the network for systems communicating over similar ports. The systems in question could be checked for hashes or fuzzy hashes to identify if similar files are identified as part of the same attack.
Stopping attacks that are underway is important, but it is not sufficient. Organizations must aim to stop attackers and prevent future attacks that rely on complex geo-political issues to evade prosecution and use secure or trusted systems. However, even if all current political issues or technical issues are resolved, there would still be attacks and still be the need for sufficient law enforcement resources for investigations. In the same token, even where one might expect the most secure of systems, the human element will always find a way to compromise it.
While some may say there is limited value in attack attribution, identifying common features or methods between different attacks can help identify other areas under attack and be extremely useful when shared with others in the information security community, as attackers will often reuse familiar attack methods.
Dig Deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis
The CryptXXX ransomware has been spreading through compromised legitimate websites that redirect to malicious sites. Expert Nick Lewis explains how ...continue reading
Attackers can use the SandJacking attack to access sandboxed data on iOS devices. Expert Nick Lewis explains how to protect your enterprise from this...continue reading
Malicious Windows BITS tasks set up by attackers can reinfect systems even after the malware has been removed. Expert Nick Lewis explains how to ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.