{"id":139,"date":"2020-01-30T06:08:39","date_gmt":"2020-01-30T06:08:39","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=139"},"modified":"2020-02-05T08:23:39","modified_gmt":"2020-02-05T08:23:39","slug":"how-to-catch-a-cyber-culprit","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/how-to-catch-a-cyber-culprit\/","title":{"rendered":"How to Catch a Cyber Culprit"},"content":{"rendered":"\n<p>Behind every investigation is a detective, tasked with combing \nthrough the trivial details at a crime scene to find the clues that \ncount. Every good detective knows what evidence to look for first: \nfingerprints. Essential to identifying a culprit, fingerprints are the \nfirst step toward uncovering other important pieces of \ninformation\u2014behaviors, intentions, motives, accomplices, related \ncrimes\u2014that can help crack a case.<\/p>\n\n\n\n<p>This is true in threat hunting too, where understanding the adversary\n is critical. Gathering intelligence\u2014such as what the attackers are most\n likely to do, who they are targeting and why, what they want to \nachieve, their go-to tactics and how they will react if detected\u2014is the \nonly realistic way to make smart decisions about how to defend our \nnetworks.<\/p>\n\n\n\n<p>This starts with observing our enemies, and their tactics, techniques  and procedures (TTPs), even when they are attempting to cover their  tracks. Leveraging network forensics, incident response processes and  known facts from previous (or active) intrusions can provide a window  into a threat actor\u2019s activities and behaviors. With facts from  controlled observations, teams can develop a hypothesis about how the  adversary operates, and the tools being used. Identifying patterns in  activity and the typical targets of a specific adversary will help the  team validate or refine the hypothesis. As adversaries evolve or change  their TTPS and targets, the hypothesis should be refreshed.<\/p>\n\n\n\n<p>Catching cyber culprits will always be a cat and mouse game. While  attackers are constantly becoming increasingly sophisticated, it will  continue to be difficult for them to completely hide their fingerprints.  Defenders that are adept at web asset fingerprinting and strategic  about how they leverage the intelligence gathered from this approach  will have far more success in answering important questions about their  adversary and blocking malicious infrastructure from their networks. <a href=\"https:\/\/www.domaintools.com\/resources\/blog\/how-to-catch-a-cyber-culprit-fingerprint-then-investigate\">Read More<\/a><\/p>\n\n\n\n<p> iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Behind every investigation is a detective, tasked with combing through the trivial details at a crime scene to find the clues that count. Every good detective knows what evidence to look for first: fingerprints. Essential to identifying a culprit, fingerprints are the first step toward uncovering other important pieces of information\u2014behaviors, intentions, motives, accomplices, related &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/how-to-catch-a-cyber-culprit\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to Catch a Cyber Culprit&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[15],"tags":[],"class_list":["post-139","post","type-post","status-publish","format-standard","hentry","category-digital-forensics"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":152,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions\/152"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}