Wait a meowment, which kitten is this?

Presented at ShmooCon 2022 Rescheduled, March 25, 2022, 3:15 p.m. (15 minutes).

It’s commonly stated that attribution of cyber activity is an art, not a science. This adage could not be more applicable to Iran-based cyber activity, as contract organizations, recruitment from hacker communities, and operators running independent self-serving campaigns muddy the attribution waters.

In this session, Allison will rant, sorry… talk about some of the unique attribution challenges around Iran-based intrusion sets using case studies from open-source information and proprietary research. Specifically, case studies will cover the overlap in tools, techniques and procedures (TTPs) by several distinct intrusion sets–including the ones known respectively as “Oilrig,” “TortoiseShell,” and “Charming Kitten”–using the diamond model of intrusion analysis as the framework for attribution.

Through her presentation, Allison would like to reiterate how threat intelligence work can be critical both when shoring up defenses, and when responding to incidents. Attendees will walk away with an understanding of Iran-based cyber threat actors’ TTPs, appreciation for attribution complexities around Iranian intrusions, and a better understanding about why attribution matters.


Presenters:

  • Allison Wikoff
    Allison Wikoff is the Americas Lead for the global Threat Intelligence function at PricewaterhouseCoopers (PwC). She has 20 years of experience working as a network defender, incident responder, intelligence analyst, and researcher. The focus of the latter half of Allison’s career to date has been researching nation-state cyber activity with a focus on Iran. Though she speaks publicly about Iranian operations, she has a passion for tracking all types of cyber threats, both nation state and criminal. Her research interests include emerging threats and threat actor mistakes. She holds numerous industry certifications and an advanced degree from Columbia University where she guest lectures for several information security-focused graduate courses.

Similar Presentations: