Threat intelligence

Better understanding of how to use attribution in threat intelligence

There is a vigorous debate about the utility of attribution in threat intelligence. How important is it for the average company that the cybercrime group Lazarus was responsible for the worldwide WannaCry attack, for example.

But now organisations are seeking ways to deploy attribution more effectively. There is a widespread recognition that only a select few commercial Threat Intelligence vendors have the capacity to research meaningful attribution, and that larger-scale and national organisations with mature defensive practices stand to benefit the most from attribution threat intelligence. For these organisations, attribution is a vital tool for prioritising cyber defences and understanding where the potential gaps are. Used correctly, attribution enables organisations to contain and respond to cyber incidents more effectively.

Identifying a specific threat actor perpetrating the cyber incident enables an organisation to understand the tactics and attack methods and to search for corresponding traces in their networks. If a threat actor is known for exploiting specific vulnerabilities, a target organisation can check and patch those vulnerabilities before exploitation. Attributing a pattern of advanced persistent threats (APTs) enables organisations to prioritise necessary measures to protect against the threat.

Global Research and Analysis Team

Kaspersky's Global Research and Analysis Team (GReAT) uncovers APTs, cyberespionage campaigns, major malware, ransomware, and underground cybercriminal trends, tracking ongoing activity of 200+ threat actors and sophisticated malicious operations targeting commercial and government organisations in 85 countries. Kaspersky analyses millions of suspicious files and activities, and our combination of sophisticated machine processing and unrivalled human expertise enables us to predict and prevent complex threats and cybercrime of the future.

Back to the threat intelligence home page

Related Articles

Threat intelligence

Is your organisation ready for threat intelligence?

Threat intelligence

Use threat intelligence to find the needle in your cybersecurity data stack

Threat intelligence

Give your threat intelligence
an intelligence test

Talk to us

Please do not hesitate to contact us if you would like any further information or have any questions.

Request a call