Whatgoalsistheactorlikelypursuingin their “cyber campaign”?
Cyber campaign = multiple, related cyber operations
EXAMPLE(CONTINUED)
Have seen similar break-ins at other local banks, always aiming foremployee credentials.
M.O. is similar to a well-known North Korean APT.
ThisAPThasstolencredentialsfromlocal banks in other countries,used those credentials to steal money from central banks.
→Probably same APT trying to steal from U.S. central bank.
QUESTIONS AT THE STRATEGIC LEVEL(HOW DO THE OPERATIONS FIT INTO THE BIGGERPICTURE?)
What larger goals is the actor trying to achieve with these cyber operations?
Dowewanttoreveal we have successfully attributed the actor, and if so, howmuch detail should we release?
Moredetailincreases credibility, improves attribution (because others can build on theanalysis), and enables better collective defenses, but could risk, for example, intelligencesources.
What should the response be (if any)?
The potential response helps determine how certain you want to be.
EXAMPLE (CONTINUED)
From other intelligence sources, know that North Korea has beentrying to find ways to fund its ongoing missile developmentprogram.
→Probably that is what they are doing with the stolen money.
Now,thehardpart:doyouleteveryone know North Korea isbehind these operations? How much do you reveal about how youknow? And how do you respond?
CONCLUSION
Attribution is onlyinpartatechnicalproblem;inpart,ittakes a good deal of social science, includingarea/country expertise.
Atthestrategic level, the question is as much about how torespond to a cyber operation as it is who was behind it.