Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure

04/29/2020
by   Peter Maynard, et al.
0

The hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT CK (ATT CK) model of a well known hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by hacktivists. We are in the process of contributing this threat actor into the ATT CK knowledge base.

READ FULL TEXT
research
03/03/2021

Threat Actor Type Inference and Characterization within Cyber Threat Intelligence

As the cyber threat landscape is constantly becoming increasingly comple...
research
12/08/2021

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

This works considers challenges of building and usage a formal knowledge...
research
08/25/2021

Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT CK

This article discusses how the gap between early 5G network threat asses...
research
04/23/2021

Collaborative Information Sharing for ML-Based Threat Detection

Recently, coordinated attack campaigns started to become more widespread...
research
04/22/2020

Advanced Persistent Threat: Detection and Defence

The critical assessment presented within this paper explores existing re...
research
04/28/2023

QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing

When a threat is observed, one of the most important challenges is to ch...
research
08/02/2022

A replication of a controlled experiment with two STRIDE variants

To avoid costly security patching after software deployment, security-by...

Please sign up or login with your details

Forgot password? Click here to reset