Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Various advanced persistent threat (APT) groups are emerging with different tactics, techniques, and procedures (TTPs) for targeting enterprises and organizations. Traditional methods that use either static or dynamic analysis might struggle to detect polymorphic and packed zero-day attacks. In this paper, we propose an approach that allows mal ware analysts to consider all aspects of an attack, including not just sample analysis but also a view into TTP-based attack vectors. By correlating observed TTPs with known threat intelligence, our approach facilitates attack attribution, helping analysts identify the threat actor behind an attack campaign. We applied our approach to a recent APT attack by the Black Basta group on Keytronics, which utilized unique delivery mechanisms for initial access. This paper then describes the entire attack vector, explaining how email bombing was used to deliver payloads like SystemBC and Black Basta ransomware. We also list the indicators of compromise, command and control traffic, persistence mechanisms, detection rules, and other unique identifiers from this attack campaign. By integrating sample-based analysis with TTP-based attack vector examination, our approach enhances existing attribution methods, providing a more comprehensive perspective on APT attack strategies.

Original languageEnglish
Title of host publicationISDFS 2025 - 13th International Symposium on Digital Forensics and Security
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798331509934
DOIs
StatePublished - 2025
Event13th International Symposium on Digital Forensics and Security, ISDFS 2025 - Boston, United States
Duration: 24 Apr 202525 Apr 2025

Publication series

NameISDFS 2025 - 13th International Symposium on Digital Forensics and Security

Conference

Conference13th International Symposium on Digital Forensics and Security, ISDFS 2025
Country/TerritoryUnited States
CityBoston
Period24/04/2525/04/25

Bibliographical note

Publisher Copyright:
© 2025 IEEE.

Keywords

  • APT
  • Attack Attribution
  • Black Basta
  • Phishing
  • Ran-somware
  • Social Engineering

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Law
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution'. Together they form a unique fingerprint.

Cite this