{"id":11788,"date":"2014-12-01T09:00:41","date_gmt":"2014-12-01T14:00:41","guid":{"rendered":"http:\/\/www.Centives.net\/S\/?p=11788"},"modified":"2014-12-01T13:28:40","modified_gmt":"2014-12-01T18:28:40","slug":"how-cyber-attacks-are-traced","status":"publish","type":"post","link":"http:\/\/www.Centives.net\/S\/2014\/how-cyber-attacks-are-traced\/","title":{"rendered":"How Cyber-Attacks Are Traced"},"content":{"rendered":"<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.Centives.net\/S\/wp-content\/uploads\/2014\/12\/120114_1826_HowCyberAtt1.jpg\" alt=\"\" width=\"639\" height=\"479\" \/><\/p>\n<p>Over the past two weeks computer security experts have been analyzing a piece of malicious software known as Regin which is targeting computers in many countries including Russia and Saudi Arabia. It is thought to be British. The Economist took a look at how experts figure out where such software comes from:<\/p>\n<ul>\n<li>There are usually clues in the targets of the software. Anything targeting Iran is likely Israeli. Suspicion would fall on NATO countries for anything targeting Russia.<\/li>\n<li>Sometimes there are clues in the code itself. In the case of Regin there were references to &#8220;Legspin&#8221; a type of cricket bowling. This has led experts to suspect British involvement.<\/li>\n<li>Code in Korean, Mandarin, Arabic or any other country specific language also provides a signpost.<\/li>\n<li>Of course designers of malicious software know that people will be looking for such clues and may plant a trail of false breadcrumbs.<\/li>\n<li>If done correctly cyber-attacks can be impossible to trace, highlighting their appeal.<\/li>\n<\/ul>\n<p>Read about some famous examples, the clues that point towards the real perpetrator, and more over <a href=\"http:\/\/www.economist.com\/blogs\/economist-explains\/2014\/11\/economist-explains-26?fsrc=rss\">here<\/a>.<\/p>\n<p>Source: <a href=\"http:\/\/www.economist.com\/blogs\/economist-explains\/2014\/11\/economist-explains-26?fsrc=rss\">The Economist<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past two weeks computer security experts have been analyzing a piece of malicious software known as Regin which is targeting computers in many countries including Russia and Saudi Arabia. It is thought to be British. The Economist took a look at how experts figure out where such software comes from: There are usually [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11787,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-daily-bulletin"],"jetpack_featured_media_url":"http:\/\/www.Centives.net\/S\/wp-content\/uploads\/2014\/12\/120114_1826_HowCyberAtt1.jpg","_links":{"self":[{"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/posts\/11788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/comments?post=11788"}],"version-history":[{"count":3,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/posts\/11788\/revisions"}],"predecessor-version":[{"id":11791,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/posts\/11788\/revisions\/11791"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/media\/11787"}],"wp:attachment":[{"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/media?parent=11788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/categories?post=11788"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.Centives.net\/S\/wp-json\/wp\/v2\/tags?post=11788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}