Abstract
Various advanced persistent threat (APT) groups are emerging with different tactics, techniques, and procedures (TTPs) for targeting enterprises and organizations. Traditional methods that use either static or dynamic analysis might struggle to detect polymorphic and packed zero-day attacks. In this paper, we propose an approach that allows mal ware analysts to consider all aspects of an attack, including not just sample analysis but also a view into TTP-based attack vectors. By correlating observed TTPs with known threat intelligence, our approach facilitates attack attribution, helping analysts identify the threat actor behind an attack campaign. We applied our approach to a recent APT attack by the Black Basta group on Keytronics, which utilized unique delivery mechanisms for initial access. This paper then describes the entire attack vector, explaining how email bombing was used to deliver payloads like SystemBC and Black Basta ransomware. We also list the indicators of compromise, command and control traffic, persistence mechanisms, detection rules, and other unique identifiers from this attack campaign. By integrating sample-based analysis with TTP-based attack vector examination, our approach enhances existing attribution methods, providing a more comprehensive perspective on APT attack strategies.
| Original language | English |
|---|---|
| Title of host publication | ISDFS 2025 - 13th International Symposium on Digital Forensics and Security |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9798331509934 |
| DOIs | |
| State | Published - 2025 |
| Event | 13th International Symposium on Digital Forensics and Security, ISDFS 2025 - Boston, United States Duration: 24 Apr 2025 → 25 Apr 2025 |
Publication series
| Name | ISDFS 2025 - 13th International Symposium on Digital Forensics and Security |
|---|
Conference
| Conference | 13th International Symposium on Digital Forensics and Security, ISDFS 2025 |
|---|---|
| Country/Territory | United States |
| City | Boston |
| Period | 24/04/25 → 25/04/25 |
Bibliographical note
Publisher Copyright:© 2025 IEEE.
Keywords
- APT
- Attack Attribution
- Black Basta
- Phishing
- Ran-somware
- Social Engineering
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Vision and Pattern Recognition
- Information Systems
- Information Systems and Management
- Safety, Risk, Reliability and Quality
- Law
- Artificial Intelligence