Cargando…
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or sensitive data (i.e., login credentials). Consequen...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8513093/ https://www.ncbi.nlm.nih.gov/pubmed/34640841 http://dx.doi.org/10.3390/s21196522 |
_version_ | 1784583149411368960 |
---|---|
author | Kim, Kyoungmin Shin, Youngsup Lee, Justin Lee, Kyungho |
author_facet | Kim, Kyoungmin Shin, Youngsup Lee, Justin Lee, Kyungho |
author_sort | Kim, Kyoungmin |
collection | PubMed |
description | During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or sensitive data (i.e., login credentials). Consequently, various APT groups have focused on exploiting these vulnerabilities. Past studies have proposed automated classification and detection methods, while few studies have covered the cyber attribution. Our study introduces an automated system that focuses on cyber attribution. Adopting MITRE’s ATT&CK for mobile, we performed our study using the tactic, technique, and procedures (TTPs). By comparing the indicator of compromise (IoC), we were able to help reduce the false flags during our experiment. Moreover, we examined 12 threat actors and 120 malware using the automated method for detecting cyber attribution. |
format | Online Article Text |
id | pubmed-8513093 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-85130932021-10-14 Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator Kim, Kyoungmin Shin, Youngsup Lee, Justin Lee, Kyungho Sensors (Basel) Communication During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or sensitive data (i.e., login credentials). Consequently, various APT groups have focused on exploiting these vulnerabilities. Past studies have proposed automated classification and detection methods, while few studies have covered the cyber attribution. Our study introduces an automated system that focuses on cyber attribution. Adopting MITRE’s ATT&CK for mobile, we performed our study using the tactic, technique, and procedures (TTPs). By comparing the indicator of compromise (IoC), we were able to help reduce the false flags during our experiment. Moreover, we examined 12 threat actors and 120 malware using the automated method for detecting cyber attribution. MDPI 2021-09-29 /pmc/articles/PMC8513093/ /pubmed/34640841 http://dx.doi.org/10.3390/s21196522 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Communication Kim, Kyoungmin Shin, Youngsup Lee, Justin Lee, Kyungho Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title_full | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title_fullStr | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title_full_unstemmed | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title_short | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator |
title_sort | automatically attributing mobile threat actors by vectorized att&ck matrix and paired indicator |
topic | Communication |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8513093/ https://www.ncbi.nlm.nih.gov/pubmed/34640841 http://dx.doi.org/10.3390/s21196522 |
work_keys_str_mv | AT kimkyoungmin automaticallyattributingmobilethreatactorsbyvectorizedattckmatrixandpairedindicator AT shinyoungsup automaticallyattributingmobilethreatactorsbyvectorizedattckmatrixandpairedindicator AT leejustin automaticallyattributingmobilethreatactorsbyvectorizedattckmatrixandpairedindicator AT leekyungho automaticallyattributingmobilethreatactorsbyvectorizedattckmatrixandpairedindicator |