|
Killed O |
|
In O |
|
Translation O |
|
|
|
O |
|
silascutler.com/2021/01/14/KilledInTranslation/ O |
|
|
|
O |
|
January O |
|
15 O |
|
, O |
|
2021 O |
|
|
|
|
|
O |
|
2021 O |
|
- O |
|
01 O |
|
- O |
|
14 O |
|
|
|
O |
|
Preface O |
|
: O |
|
|
|
O |
|
A O |
|
director O |
|
at O |
|
Google O |
|
once O |
|
told O |
|
me O |
|
that O |
|
the O |
|
larger O |
|
an O |
|
organization O |
|
, O |
|
the O |
|
less O |
|
subtlety O |
|
is O |
|
possible O |
|
|
|
O |
|
in O |
|
what O |
|
it O |
|
says O |
|
publicly O |
|
, O |
|
and O |
|
even O |
|
the O |
|
most O |
|
carefully O |
|
postulated O |
|
assessment O |
|
, O |
|
cushioned O |
|
with O |
|
|
|
O |
|
supporting O |
|
analytic O |
|
language O |
|
, O |
|
will O |
|
be O |
|
interpreted O |
|
as O |
|
fact O |
|
. O |
|
|
|
O |
|
Naming O |
|
of O |
|
threat O |
|
actor O |
|
groups O |
|
and O |
|
malware O |
|
is O |
|
a O |
|
critical O |
|
aspect O |
|
to O |
|
tracking O |
|
cyber O |
|
operations O |
|
. O |
|
|
|
O |
|
Armchair O |
|
Researchers O |
|
, O |
|
more O |
|
concerned O |
|
with O |
|
social O |
|
media O |
|
follower O |
|
counts O |
|
, O |
|
often O |
|
decry O |
|
these O |
|
|
|
O |
|
names O |
|
as O |
|
marketing O |
|
hooks O |
|
, O |
|
whereas O |
|
they O |
|
are O |
|
actually O |
|
complex O |
|
shibboleths O |
|
that O |
|
convey O |
|
the O |
|
|
|
O |
|
scope O |
|
of O |
|
a O |
|
set O |
|
of O |
|
activity O |
|
and O |
|
its O |
|
sourcing O |
|
. O |
|
|
|
O |
|
Since O |
|
roughly O |
|
2016 O |
|
, O |
|
the O |
|
United O |
|
States O |
|
government O |
|
has O |
|
been O |
|
actively O |
|
working O |
|
to O |
|
collaborate O |
|
|
|
O |
|
with O |
|
non O |
|
- O |
|
government O |
|
agencies O |
|
. O |
|
The O |
|
National O |
|
Security O |
|
Agency O |
|
( O |
|
NSA O |
|
) O |
|
, O |
|
Cybersecurity O |
|
and O |
|
|
|
O |
|
Infrastructure O |
|
Security O |
|
Agency O |
|
( O |
|
CISA O |
|
) O |
|
, O |
|
and O |
|
the O |
|
Federal O |
|
Bureau O |
|
of O |
|
Investigation O |
|
( O |
|
FBI O |
|
) O |
|
have O |
|
all O |
|
|
|
O |
|
begun O |
|
publicly O |
|
sharing O |
|
tactical O |
|
reporting O |
|
containing O |
|
technical O |
|
details O |
|
, O |
|
indicators O |
|
, O |
|
and O |
|
|
|
O |
|
defensive O |
|
recommendations O |
|
. O |
|
These O |
|
reports O |
|
have O |
|
become O |
|
a O |
|
staple O |
|
of O |
|
any O |
|
major O |
|
cyber O |
|
|
|
O |
|
incident O |
|
because O |
|
they O |
|
provide O |
|
an O |
|
authoritative O |
|
situational O |
|
overview O |
|
and O |
|
an O |
|
initial O |
|
starting O |
|
|
|
O |
|
point O |
|
for O |
|
collaboration O |
|
. O |
|
|
|
O |
|
In O |
|
recent O |
|
reports[1][2 O |
|
] O |
|
, O |
|
attribution O |
|
has O |
|
been O |
|
presented O |
|
at O |
|
the O |
|
forefront O |
|
of O |
|
the O |
|
report O |
|
and O |
|
used O |
|
|
|
O |
|
industry O |
|
cryptonyms O |
|
along O |
|
with O |
|
military O |
|
units O |
|
or O |
|
specific O |
|
government O |
|
entities O |
|
. O |
|
While O |
|
this O |
|
may O |
|
|
|
O |
|
be O |
|
intended O |
|
to O |
|
support O |
|
broader O |
|
usage O |
|
( O |
|
outside O |
|
of O |
|
technical O |
|
consumers O |
|
) O |
|
, O |
|
attribution O |
|
in O |
|
these O |
|
|
|
O |
|
reports O |
|
, O |
|
without O |
|
supporting O |
|
analysis O |
|
, O |
|
is O |
|
creating O |
|
a O |
|
dangerous O |
|
precedent O |
|
. O |
|
|
|
O |
|
Technical O |
|
analysis O |
|
is O |
|
fundamentally O |
|
rooted O |
|
in O |
|
scientific O |
|
methodology O |
|
. O |
|
When O |
|
research O |
|
is O |
|
|
|
O |
|
presented O |
|
, O |
|
a O |
|
basic O |
|
requirement O |
|
is O |
|
that O |
|
it O |
|
is O |
|
sufficiently O |
|
detailed O |
|
to O |
|
be O |
|
validated O |
|
by O |
|
reproducing O |
|
|
|
O |
|
the O |
|
analysis O |
|
. O |
|
Within O |
|
the O |
|
aforenoted O |
|
reports O |
|
, O |
|
attribution O |
|
is O |
|
presented O |
|
as O |
|
a O |
|
statement O |
|
of O |
|
fact O |
|
, O |
|
|
|
O |
|
similar O |
|
in O |
|
confidence O |
|
to O |
|
the O |
|
reported O |
|
dates O |
|
or O |
|
software O |
|
versions O |
|
, O |
|
instead O |
|
of O |
|
as O |
|
a O |
|
confidencestructured O |
|
assessment O |
|
. O |
|
|
|
O |
|
It O |
|
may O |
|
be O |
|
possible O |
|
the O |
|
authors O |
|
of O |
|
these O |
|
reports O |
|
have O |
|
a O |
|
Palantír[3 O |
|
] O |
|
, O |
|
allowing O |
|
them O |
|
to O |
|
perfectly O |
|
|
|
O |
|
identify O |
|
the O |
|
hostile O |
|
authors O |
|
, O |
|
but O |
|
without O |
|
proper O |
|
confidence O |
|
language O |
|
and O |
|
presentation O |
|
, O |
|
these O |
|
|
|
O |
|
assessments O |
|
are O |
|
just O |
|
as O |
|
likely O |
|
to O |
|
have O |
|
been O |
|
made O |
|
by O |
|
a O |
|
roll O |
|
of O |
|
the O |
|
dice O |
|
. O |
|
|
|
O |
|
In O |
|
future O |
|
reports O |
|
, O |
|
providing O |
|
context O |
|
regarding O |
|
how O |
|
reported O |
|
activity O |
|
links O |
|
to O |
|
named O |
|
sets O |
|
will O |
|
|
|
O |
|
provide O |
|
critical O |
|
information O |
|
to O |
|
existing O |
|
understanding O |
|
of O |
|
these O |
|
groups O |
|
. O |
|
In O |
|
instances O |
|
where O |
|
|
|
O |
|
providing O |
|
this O |
|
information O |
|
may O |
|
risk O |
|
sources O |
|
and O |
|
methods O |
|
, O |
|
limiting O |
|
assessed O |
|
attribution O |
|
to O |
|
a O |
|
|
|
O |
|
1/2 O |
|
|
|
|
|
O |
|
broad O |
|
geographic O |
|
estimate O |
|
or O |
|
omitting O |
|
it O |
|
entirely O |
|
may O |
|
provide O |
|
a O |
|
better O |
|
service O |
|
. O |
|
|
|
O |
|
[ O |
|
1 O |
|
] O |
|
|
|
O |
|
https://media.defense.gov/2020/May/28/2002306626/-1/-1/0/CSA%20Sandworm%20Actors O |
|
|
|
O |
|
% O |
|
20Exploiting%20Vulnerability%20in%20Exim%20Transfer%20Agent%2020200528.pdf O |
|
|
|
O |
|
[ O |
|
2 O |
|
] O |
|
https://media.defense.gov/2020/Jul/16/2002457639/-1/-1/0/NCSC_APT29_ADVISORYQUAD-OFFICIAL-20200709-1810.PDF O |
|
|
|
O |
|
[ O |
|
3 O |
|
] O |
|
https://en.wikipedia.org/wiki/Palant%C3%ADr O |
|
|
|
O |
|
Older O |
|
|
|
O |
|
Backdooring O |
|
a O |
|
HID O |
|
Reader O |
|
|
|
|
|
O |
|
2/2 O |