Skip to content

Commit

Permalink
* update 2024-12-10 06:22:31
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Dec 9, 2024
1 parent a909c26 commit 8802d4b
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -3758,3 +3758,15 @@

</details>

<details>

<summary>2024-12-06 12:46:49 - Analysing the cultural dimensions of cybercriminal groups -- A case study on the Conti ransomware group</summary>

- *Konstantinos Mersinas, Aimee Liu, Niki Panteli*

- `2411.02548v2` - [abs](http://arxiv.org/abs/2411.02548v2) - [pdf](http://arxiv.org/pdf/2411.02548v2)

> Cybercriminal profiling and cyber-attack attribution have been elusive goals world-wide, due to their effects on societal and geopolitical balance and stability. Attributing actions to a group or state is a complex endeavour, with traditional established approaches including cyber threat intelligence and analysis of technical means such as malware analysis, network forensics, and geopolitical intelligence. However, we propose an additional component for profiling threat actor groups through analysing cultural aspects of human behaviours and interactions. We utilise a set of variables which determine characteristics of national and organisational culture to create a cultural "footprint" of cybercriminal groups. As a case study, we conduct thematic analysis across the six dimensions of the Hofstede national culture classification and the eight dimensions of the Meyer classification on leaked internal communications of the ransomware group Conti. We propose that a systematic analysis of similar communications can serve as a practical tool for a) understanding the modus operandi of cybercrime and cyberwarfare-related groups, and b) profiling cybercriminal groups and/or nation-state actors. Insights from such applications can, first, assist in combating cybercrime and, second, if combined with additional cyber threat intelligence, can provide a level of confidence in nuanced cyber-attack attribution processes.

</details>

Loading

0 comments on commit 8802d4b

Please sign in to comment.