Leveraging OSINT to Track Cyber Threat Actors

Subscribers:
23,800
Published on ● Video Link: https://www.youtube.com/watch?v=HrYvM4-ZA_Q



Duration: 32:21
2,287 views
51


In the cyber threat intelligence world, OSINT is often synonymous with technical indicators and internet scanning tools. While these play a major role in tracking cyber threat actors (a.k.a. hackers), there are non-technical OSINT techniques that support tracking threat actors. Several common open sources leveraged in tracking threat actors include indictments, corporate registries, news and social media. There are several cases that demonstrate this notion. In particular, contextualising information operations based on postmortem social media accounts; using indictment and sanction announcements to pivot off and find information that has not been previously reported by the FBI; and using news media to expose an Iran-based threat actor targeting the technology sector. These cases are not only applicable to threat intelligence analysts, but law enforcement, investigative journalists, and similar investigative professions.

Curtis Hanson @cybershtuff, Threat Intelligence Analyst, PwC

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at http://www.sans.org/u/195g

#OSINTSummit







Tags:
sans institute
blue team
blue team operations
curtis hanson
osint
open-source intelligence
open-source intel
osint summit
sans osint summit
osint investigation
osint investigation techniques
osint investigation tools
osint investigations
osint tools