SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
HACKING&TROLLING
THECHANGINGFACE
OFHACKTIVISMIN
THEDISINFORMATION
AGE
iDefense Threat Intelligence
Mei Nelson
December 11, 2019
© 2019 Accenture.
ACCENTURE SECURITY
Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on
innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding
across client value chains and services that span the security lifecycle, Accenture protects organizations’
valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital
identity, application security and managed security, Accenture enables businesses around the world to defend
against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at
www.accenture.com/security.
This document is produced by consultants at Accenture as general guidance. It is not intended to provide
specific advice on your circumstances. If you require advice or further details on any matters referred to,
please contact your Accenture representative.
The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not
constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates.
LEGAL NOTICE & DISCLAIMER
Copyright © 2019 Accenture. All rights reserved.
WHO AM I
3
Copyright © 2019 Accenture Security. All rights reserved.
Mei Nelson
Security Principal
Geopolitical and Strategic
Intelligence Team
iDefense Threat Intelligence
Accenture Security
Accenture
HACKER – HACKTIVIST – HACKTIVISM
Copyright © 2019 Accenture Security. All rights reserved.
Using hacking skills to spread a specific message and bring attention to a political
or social cause
or
The use of malicious cyber activities by non-state actors for ideological purposes
(iDefense)
Hacktivist
Hacker + Activist
Combines traditional activist tactics with hacking techniques
Hacktivism
Hacker
5
HACKTIVISM
Decline?
Copyright © 2019 Accenture. All rights reserved.
The Cult of the Dead
Cow - the Dead Cow
Died?
Source: cDC
Source: Google
6
HACKTIVISM
Changing Face?
Copyright © 2019 Accenture. All rights reserved.
Source: Wikimedia
7
THE CHANGING FACE OF
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
Non-state Actors
State Actors
8
THE CHANGING FACE OF
Malicious Cyber Activities
Breaking into No Breaking into
Systems Systems
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
HACKTIVISM
&
THEDISINFORMATION AGE
Copyright © 2019 Accenture. All rights reserved.
Disinformation
Propaganda
Misinformation
10Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
THREE TYPES & THREE DIMENSIONS
DISINFORMATION OPERATIONS
GOALS: THE “D” WORDS
11
DIVIDE DISCREDIT DISTRACT DENY
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
METHODS
12
“WHITE” METHOD
Broadcasting one’s
message openly
through state
media
“GRAY” METHOD
Placing information in
other sympathetic
media
“BLACK” METHOD
Using hackers,
trolls, and
honeypots
Copyright © 2019 Accenture. All rights reserved.
13
• Flooding the media with multiple versions of a story to
confuse the audience
• Publicizing scandalous information to discredit a critic
or adversary
• Distracting world opinion from negative information,
by highlighting or even creating some other crisis or
scandal
• Using inauthentic social media profiles to inflame real-
world violence by publicizing rallies of rival groups
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
TACTICS
14
CYBER-ENABLED INFORMATION OPERATIONS
Broadly
Any information operations taking place in
cyberspace, including in online media and social
media
Narrowly
Information operations leveraging offensive
cyber threat activity such as subverting secure
system
Copyright © 2019 Accenture. All rights reserved.
15
CYBER-ENABLED INFORMATION OPERATIONS
Hacktivism
Non-state actors for
ideological purposes
State-controlled
hacktivism using false
personas
Copyright © 2019 Accenture. All rights reserved.
State-encouraged
hacktivism trolling
16
CASE STUDY: #MACRONLEAKS (PART I)
• Disinformation campaign: rumors,
fake news, forged documents
• Offensive network intrusion:
computers of Macron’s campaign
staff
• Spreading stolen data using trolls
and bots
Source: Reuters
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: #MACRONLEAKS (PART II)
17
• Spear phishing campaign
• Hacktivist personas
• Social media bots
• Imagery board: 4chan
SNAKEMACKEREL (APT 28)
Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
18
SKATE
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: ENDLESS MAYFLY & OPERATION
NEWSCASTER
1. Used typo-squatted domains to create
inauthentic websites
2. Promoted these domains on social
media platforms using inauthentic
personas
3. Hosted malicious mobile applications
4. Leveraged “ephemeral disinformation”
– Burn After Reading
18
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
19
Cyber-nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
principle: “we will
not attack unless
we are attacked”
Following key
historical dates
and international
events involving
in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
20
Fandom Nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
through social
media
Following
international events
involving in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
21
Diba Expedition
Copyright © 2019 Accenture. All rights reserved.
Actor:
Warriors/Crusaders
Weapon:
Emoji packs
Battlefield:
Social media
platforms
Goal:
National unity?
WHEREISTHIS
HEADING?
22Copyright © 2019 Accenture. All rights reserved.
23
This Photo by Unknown Author is licensed under CC BY
This Photo by Unknown Author is licensed under CC BY
HACKING
A FOREVER WAR OF DECEPTION:
DEEPFAKES EMERGE
24
25
SUGGESTIONS
• Follow geopolitical events
• Set social media policies
• Filter inauthentic accounts
• Verify claims
• Investigate information sources
Copyright © 2019 Accenture. All rights reserved.
HACKING&TROLLING:THECHANGINGFACEOFHACKTIVISMINTHEDISINFORMATIONAGE

Contenu connexe

Tendances

A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsTripwire
 
McAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris YoungMcAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris Youngscoopnewsgroup
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Tripwire
 
AFCEA - DOD Cyber
AFCEA - DOD CyberAFCEA - DOD Cyber
AFCEA - DOD CyberIman Smith
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllJarno Limnéll
 
Holistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imageryHolistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imageryRohini Lakshané
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckJarno Limnéll
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsBlack Duck by Synopsys
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farHardik Ashok Kevadiya
 
InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfraGardNCR
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCentre Technologies
 

Tendances (20)

A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
McAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris YoungMcAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris Young
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017
 
AFCEA - DOD Cyber
AFCEA - DOD CyberAFCEA - DOD Cyber
AFCEA - DOD Cyber
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Holistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imageryHolistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imagery
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
 
InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 

Similaire à HACKING&TROLLING:THECHANGINGFACEOFHACKTIVISMINTHEDISINFORMATIONAGE

[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...CODE BLUE
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynBoston Global Forum
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Sparity Inc.
 
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know AboutIs Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know AboutBernard Marr
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Bernard Marr
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Bernard Marr
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
 
Federal Vision 2030
Federal Vision 2030Federal Vision 2030
Federal Vision 2030accenture
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 

Similaire à HACKING&TROLLING:THECHANGINGFACEOFHACKTIVISMINTHEDISINFORMATIONAGE (20)

[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar
 
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know AboutIs Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Federal Vision 2030
Federal Vision 2030Federal Vision 2030
Federal Vision 2030
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 

Plus de REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerREVULN
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanREVULN
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...REVULN
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckREVULN
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?REVULN
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...REVULN
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
 

Plus de REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Dernier

11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Dernier (14)

11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 

HACKING&TROLLING:THECHANGINGFACEOFHACKTIVISMINTHEDISINFORMATIONAGE

  • 2. © 2019 Accenture. ACCENTURE SECURITY Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security. This document is produced by consultants at Accenture as general guidance. It is not intended to provide specific advice on your circumstances. If you require advice or further details on any matters referred to, please contact your Accenture representative. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. LEGAL NOTICE & DISCLAIMER Copyright © 2019 Accenture. All rights reserved.
  • 3. WHO AM I 3 Copyright © 2019 Accenture Security. All rights reserved. Mei Nelson Security Principal Geopolitical and Strategic Intelligence Team iDefense Threat Intelligence Accenture Security Accenture
  • 4. HACKER – HACKTIVIST – HACKTIVISM Copyright © 2019 Accenture Security. All rights reserved. Using hacking skills to spread a specific message and bring attention to a political or social cause or The use of malicious cyber activities by non-state actors for ideological purposes (iDefense) Hacktivist Hacker + Activist Combines traditional activist tactics with hacking techniques Hacktivism Hacker
  • 5. 5 HACKTIVISM Decline? Copyright © 2019 Accenture. All rights reserved. The Cult of the Dead Cow - the Dead Cow Died? Source: cDC Source: Google
  • 6. 6 HACKTIVISM Changing Face? Copyright © 2019 Accenture. All rights reserved. Source: Wikimedia
  • 7. 7 THE CHANGING FACE OF Hacktivism Copyright © 2019 Accenture. All rights reserved. Non-state Actors State Actors
  • 8. 8 THE CHANGING FACE OF Malicious Cyber Activities Breaking into No Breaking into Systems Systems Hacktivism Copyright © 2019 Accenture. All rights reserved.
  • 9. HACKTIVISM & THEDISINFORMATION AGE Copyright © 2019 Accenture. All rights reserved.
  • 10. Disinformation Propaganda Misinformation 10Copyright © 2019 Accenture. All rights reserved. INFORMATION OPERATIONS THREE TYPES & THREE DIMENSIONS
  • 11. DISINFORMATION OPERATIONS GOALS: THE “D” WORDS 11 DIVIDE DISCREDIT DISTRACT DENY Copyright © 2019 Accenture. All rights reserved.
  • 12. DISINFORMATION OPERATIONS METHODS 12 “WHITE” METHOD Broadcasting one’s message openly through state media “GRAY” METHOD Placing information in other sympathetic media “BLACK” METHOD Using hackers, trolls, and honeypots Copyright © 2019 Accenture. All rights reserved.
  • 13. 13 • Flooding the media with multiple versions of a story to confuse the audience • Publicizing scandalous information to discredit a critic or adversary • Distracting world opinion from negative information, by highlighting or even creating some other crisis or scandal • Using inauthentic social media profiles to inflame real- world violence by publicizing rallies of rival groups Copyright © 2019 Accenture. All rights reserved. DISINFORMATION OPERATIONS TACTICS
  • 14. 14 CYBER-ENABLED INFORMATION OPERATIONS Broadly Any information operations taking place in cyberspace, including in online media and social media Narrowly Information operations leveraging offensive cyber threat activity such as subverting secure system Copyright © 2019 Accenture. All rights reserved.
  • 15. 15 CYBER-ENABLED INFORMATION OPERATIONS Hacktivism Non-state actors for ideological purposes State-controlled hacktivism using false personas Copyright © 2019 Accenture. All rights reserved. State-encouraged hacktivism trolling
  • 16. 16 CASE STUDY: #MACRONLEAKS (PART I) • Disinformation campaign: rumors, fake news, forged documents • Offensive network intrusion: computers of Macron’s campaign staff • Spreading stolen data using trolls and bots Source: Reuters Copyright © 2019 Accenture. All rights reserved.
  • 17. CASE STUDY: #MACRONLEAKS (PART II) 17 • Spear phishing campaign • Hacktivist personas • Social media bots • Imagery board: 4chan SNAKEMACKEREL (APT 28) Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
  • 18. 18 SKATE Copyright © 2019 Accenture. All rights reserved. CASE STUDY: ENDLESS MAYFLY & OPERATION NEWSCASTER 1. Used typo-squatted domains to create inauthentic websites 2. Promoted these domains on social media platforms using inauthentic personas 3. Hosted malicious mobile applications 4. Leveraged “ephemeral disinformation” – Burn After Reading 18
  • 19. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 19 Cyber-nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” principle: “we will not attack unless we are attacked” Following key historical dates and international events involving in state’s interests
  • 20. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 20 Fandom Nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” through social media Following international events involving in state’s interests
  • 21. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 21 Diba Expedition Copyright © 2019 Accenture. All rights reserved. Actor: Warriors/Crusaders Weapon: Emoji packs Battlefield: Social media platforms Goal: National unity?
  • 22. WHEREISTHIS HEADING? 22Copyright © 2019 Accenture. All rights reserved.
  • 23. 23 This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY HACKING
  • 24. A FOREVER WAR OF DECEPTION: DEEPFAKES EMERGE 24
  • 25. 25 SUGGESTIONS • Follow geopolitical events • Set social media policies • Filter inauthentic accounts • Verify claims • Investigate information sources Copyright © 2019 Accenture. All rights reserved.