Projects per year
Abstract
The hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CK TM (ATT&CK) model of a well known hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by hacktivists. We are in the process of contributing this threat actor into the MITRE ATT&CK knowledge base.
Original language | English |
---|---|
Title of host publication | 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA): Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Number of pages | 7 |
DOIs | |
Publication status | Published - 14 Jul 2020 |
Event | 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) - Dublin, Ireland Duration: 15 Jun 2020 → 19 Jun 2020 |
Conference
Conference | 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) |
---|---|
Country/Territory | Ireland |
City | Dublin |
Period | 15/06/2020 → 19/06/2020 |
Fingerprint
Dive into the research topics of 'Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the ‘Hacktivist’ Threat to Critical Infrastructure'. Together they form a unique fingerprint.Projects
- 1 Finished
-
R1594ECI: Analysing and Detecting Advanced Multistage Attacks Against ICS
McLaughlin, K. (PI)
13/01/2016 → 30/09/2018
Project: Research