Old foe or new enemy? Here’s how researchers handle APT attribution

Old foe or new enemy? Here’s how researchers handle APT attribution

Malwarebytes’ exposé of LazyScripter revealed that the group has operated since at least 2018, targeting International Air Transport Association (IATA) members, airlines and immigrants seeking employment in Canada. (Scazon/CC BY 2.0)

With cybercriminals commonly sharing tactics and techniques on underground forums, and with digital adversaries frequently leveraging many of the same commodity malwares and commercially available tools, it can be difficult to assign attribution to a cyber campaign.


So when researchers claim to uncover that a previously unknown APT group is behind a series of attacks – as threat hunters from Malwarebytes did this week in announcing their discovery of a newly observed actor called LazyScripter – it’s usually an intriguing development.


The emergence of any newly unearthed actor often carries significance, as it is important for observers to understand the group’s motivations so that targeted parties are properly warned of their potential victimization, and are advised of what techniques to watch.


Adam Meyers, se ..

Support the originator by clicking the read the rest link below.