Overview
Syllabus
Introduction
Traditional Attribution
Benefits
Drawbacks
Infosec Failures
Media Examples
What Attribution Should Do
Results of Attribution
Goals of Attribution
Operations vs. Identity
Attribution Limitation
Introducing the Diamond Model
Infrastructure - Atomic
Infrastructure - Behavioral
Capabilities - Behavioral
ALLANITE aka PALMETTO FUSION
Distinctions
ALLANITE Phishing
Targeting Differences
Diamond Model Evaluation
Implications
COVELLITE Publicity
COVELLITE Document
COVELLITE and LAZARUS
The Problem with LAZARUS
The Defender Problem
Make Defense Manageable
Process