Conducting a Successful False Flag Cyber Operation (Blame it on China)

Presented at Black Hat Europe 2019, Dec. 4, 2019, 11 a.m. (50 minutes)

Cyber attribution is hard, really hard. But luckily for attackers, a new armchair analyst is born every minute. Given any high profile hack, Captain Attribution™ is sure to show up and tell you how obvious it is that {China|Russia|USA|Israel|Iran|USA} hacked your network. But how hard is it to conduct a false flag cyber operation? Turns out it's probably easier than you think. In this session, we'll examine some keys to a successful false flag operation. The subject of false flag operations has long been popular, but with a number of recent high profile hacking operations, the idea of false flag cyber operations has become a household term. Nation states are resorting to these attacks as well - Russia was caught red handed trying to blame Lazarus for the Olympic Destroyer attacks.


Presenters:

  • Jake Williams - Principal Consultant, Rendition Infosec
    Jake Williams is the co-founder of Rendition Infosec and a principal consultant performing incident response, computer forensics, penetration testing, malware reverse engineering, and exploit development. Jake is a certified SANS Instructor and course author and trains thousands annually in information security topics. Prior to founding Rendition Infosec, Jake worked in various roles with the US DoD performing offensive and defensive cyber operations in classified environments. Jake regularly briefs Fortune 500 executives on information security topics and has a knack for translating complex technical topics into verbiage that anyone can understand.

Links:

Similar Presentations: