Pattern of Life and Temporal Signatures of Hacker Organizations

Pattern of Life and Temporal Signatures of Hacker Organizations

Observing an organization or person by their activities using web intelligence can provide interesting clues about who and where they actually are. These clues can include targets, methods, tools, language, etc. This is true in both the physical and cyber world.

In this post we’ll look at the temporal signature of activities by hacker groups and use those to discern their pattern of life – basically their work week – for matching with national work weeks/schedules.

Top level conclusion?

Different groups have different temporal signatures that could potentially be used to differentiate between those on very regular schedules – i.e. working a desk job (nation state?) – and those on nights/weekend schedules – independent hackers? – as well as to establish their geographic location.

Temporal analysis has long played a part in cyber defense. For example, Bob Gourley, who was the Director of Intelligence for a new (at the time) military unit responsible for defending all DoD networks, indicated in a conversation with me the initial Moonlight Maze intrusion set matched up very well with working hours in Moscow.

This was just one of many other factors that pointed to Russian involvement, but it helped orient analysts.

Another example is how Mandiant used observations of hacker team activity as one signal of indicating a group being Chinese (or in other other countries in same time zone):

“Hacker teams regularly began work, for the most part, at 8 a.m. Beijing time. Usually they continued for a standard work day, but sometimes the hacking persisted until midnight.”

KPMG calls out in their Cyber threat intelligence and the lessons from law enforcement report:

“Time: Are there any temporal patterns regarding cyber attacks and, similarly, are your information assets more vulnerable at certain times?”

Sample world wide work week patterns

A quick summary of work week data from Wikipedia yields us the following on work week from around the world:

Analyzing hacker groups given work week as baseline

Now given the above temporal signatures – can we say anything about various hacker groups? We’ll find out using the Recorded Future data set, and in particular 250,000 cyber threat events involving various groups and individuals and times of attacks all collected from open web sources ranging from Twitter and other social media to government sites to hacker forums to regular news in seven different languages.

We’ve taken all the time points of the events and transformed them to day of week so that we can determine what days various groups activate and other patterns.

Below we look at a series of hacker groups – Syrian Electronic Army, Anonymous, Al Qassam Cyber Fighters, Lulzsec, Zcompany, and TeaMp0ison – versus a large group of other cyber events that either fall with other groups (Nation states, individuals, and other groups) as well as non-attributed attacks. Our data collection harvests open source data, so obviously, there is potential for skewing towards more media oriented groups (e.g. Anonymous, and yes, we have more data on them), but given that we’re looking at the pattern, not the volume, this should be less of an issue.

The graph above visualizes weekday distribution for each group. A statistical test for non-random distribution is at the very bottom of the post.

Group-by-group observations

Conclusion

Temporal signatures can be helpful in developing pattern of life analysis on groups in cyberspace. Obviously it’s only one signal, but potentially a quite interesting one.

Appendix – comments on data and analysis

Statistical Significance

Anonymous.p.value 0.000000e+00 Lulzsec.p.value 1.859388e-155 Qassam Cyber Fighters.p.value 1.012541e-09 Syrian Electronic Army.p.value 1.349523e-17 TeaMp0ison.p.value 8.786394e-07 ZCompany.p.value 7.409912e-02 Untagged.p.value 0.000000e+00

Events by Group per Day

Su Mo Tu We Th Fr Sa Anonymous 5199 3631 3394 4079 5890 4321 6587 Lulzsec 456 488 628 924 257 389 208 Qassam Cyber Fighters 59 91 51 75 37 43 28 Syrian Electronic Army 75 82 51 46 39 22 8 TeaMp0ison 1 6 13 17 26 6 8 ZCompany 1 4 8 6 6 1 2 Untagged 31629 50451 51697 53206 53699 46981 37949