SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
HACKING&TROLLING
THECHANGINGFACE
OFHACKTIVISMIN
THEDISINFORMATION
AGE
iDefense Threat Intelligence
Mei Nelson
December 11, 2019
© 2019 Accenture.
ACCENTURE SECURITY
Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on
innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding
across client value chains and services that span the security lifecycle, Accenture protects organizations’
valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital
identity, application security and managed security, Accenture enables businesses around the world to defend
against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at
www.accenture.com/security.
This document is produced by consultants at Accenture as general guidance. It is not intended to provide
specific advice on your circumstances. If you require advice or further details on any matters referred to,
please contact your Accenture representative.
The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not
constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates.
LEGAL NOTICE & DISCLAIMER
Copyright © 2019 Accenture. All rights reserved.
WHO AM I
3
Copyright © 2019 Accenture Security. All rights reserved.
Mei Nelson
Security Principal
Geopolitical and Strategic
Intelligence Team
iDefense Threat Intelligence
Accenture Security
Accenture
HACKER – HACKTIVIST – HACKTIVISM
Copyright © 2019 Accenture Security. All rights reserved.
Using hacking skills to spread a specific message and bring attention to a political
or social cause
or
The use of malicious cyber activities by non-state actors for ideological purposes
(iDefense)
Hacktivist
Hacker + Activist
Combines traditional activist tactics with hacking techniques
Hacktivism
Hacker
5
HACKTIVISM
Decline?
Copyright © 2019 Accenture. All rights reserved.
The Cult of the Dead
Cow - the Dead Cow
Died?
Source: cDC
Source: Google
6
HACKTIVISM
Changing Face?
Copyright © 2019 Accenture. All rights reserved.
Source: Wikimedia
7
THE CHANGING FACE OF
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
Non-state Actors
State Actors
8
THE CHANGING FACE OF
Malicious Cyber Activities
Breaking into No Breaking into
Systems Systems
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
HACKTIVISM
&
THEDISINFORMATION AGE
Copyright © 2019 Accenture. All rights reserved.
Disinformation
Propaganda
Misinformation
10Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
THREE TYPES & THREE DIMENSIONS
DISINFORMATION OPERATIONS
GOALS: THE “D” WORDS
11
DIVIDE DISCREDIT DISTRACT DENY
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
METHODS
12
“WHITE” METHOD
Broadcasting one’s
message openly
through state
media
“GRAY” METHOD
Placing information in
other sympathetic
media
“BLACK” METHOD
Using hackers,
trolls, and
honeypots
Copyright © 2019 Accenture. All rights reserved.
13
• Flooding the media with multiple versions of a story to
confuse the audience
• Publicizing scandalous information to discredit a critic
or adversary
• Distracting world opinion from negative information,
by highlighting or even creating some other crisis or
scandal
• Using inauthentic social media profiles to inflame real-
world violence by publicizing rallies of rival groups
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
TACTICS
14
CYBER-ENABLED INFORMATION OPERATIONS
Broadly
Any information operations taking place in
cyberspace, including in online media and social
media
Narrowly
Information operations leveraging offensive
cyber threat activity such as subverting secure
system
Copyright © 2019 Accenture. All rights reserved.
15
CYBER-ENABLED INFORMATION OPERATIONS
Hacktivism
Non-state actors for
ideological purposes
State-controlled
hacktivism using false
personas
Copyright © 2019 Accenture. All rights reserved.
State-encouraged
hacktivism trolling
16
CASE STUDY: #MACRONLEAKS (PART I)
• Disinformation campaign: rumors,
fake news, forged documents
• Offensive network intrusion:
computers of Macron’s campaign
staff
• Spreading stolen data using trolls
and bots
Source: Reuters
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: #MACRONLEAKS (PART II)
17
• Spear phishing campaign
• Hacktivist personas
• Social media bots
• Imagery board: 4chan
SNAKEMACKEREL (APT 28)
Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
18
SKATE
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: ENDLESS MAYFLY & OPERATION
NEWSCASTER
1. Used typo-squatted domains to create
inauthentic websites
2. Promoted these domains on social
media platforms using inauthentic
personas
3. Hosted malicious mobile applications
4. Leveraged “ephemeral disinformation”
– Burn After Reading
18
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
19
Cyber-nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
principle: “we will
not attack unless
we are attacked”
Following key
historical dates
and international
events involving
in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
20
Fandom Nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
through social
media
Following
international events
involving in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
21
Diba Expedition
Copyright © 2019 Accenture. All rights reserved.
Actor:
Warriors/Crusaders
Weapon:
Emoji packs
Battlefield:
Social media
platforms
Goal:
National unity?
WHEREISTHIS
HEADING?
22Copyright © 2019 Accenture. All rights reserved.
23
This Photo by Unknown Author is licensed under CC BY
This Photo by Unknown Author is licensed under CC BY
HACKING
A FOREVER WAR OF DECEPTION:
DEEPFAKES EMERGE
24
25
SUGGESTIONS
• Follow geopolitical events
• Set social media policies
• Filter inauthentic accounts
• Verify claims
• Investigate information sources
Copyright © 2019 Accenture. All rights reserved.
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age

Weitere ähnliche Inhalte

Was ist angesagt?

DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
AFCEA - DOD Cyber
AFCEA - DOD CyberAFCEA - DOD Cyber
AFCEA - DOD Cyber
Iman Smith
 

Was ist angesagt? (20)

A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
McAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris YoungMcAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris Young
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017
 
AFCEA - DOD Cyber
AFCEA - DOD CyberAFCEA - DOD Cyber
AFCEA - DOD Cyber
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Holistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imageryHolistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imagery
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
 
InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 

Ähnlich wie Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age

InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 

Ähnlich wie Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age (20)

[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar
 
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know AboutIs Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
Is Artificial Intelligence Dangerous? 6 AI Risks Everyone Should Know About
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Federal Vision 2030
Federal Vision 2030Federal Vision 2030
Federal Vision 2030
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 

Mehr von REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
REVULN
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
REVULN
 

Mehr von REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Kürzlich hochgeladen

Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
Awaiskhalid96
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 

Kürzlich hochgeladen (20)

Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 

Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age

  • 2. © 2019 Accenture. ACCENTURE SECURITY Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security. This document is produced by consultants at Accenture as general guidance. It is not intended to provide specific advice on your circumstances. If you require advice or further details on any matters referred to, please contact your Accenture representative. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. LEGAL NOTICE & DISCLAIMER Copyright © 2019 Accenture. All rights reserved.
  • 3. WHO AM I 3 Copyright © 2019 Accenture Security. All rights reserved. Mei Nelson Security Principal Geopolitical and Strategic Intelligence Team iDefense Threat Intelligence Accenture Security Accenture
  • 4. HACKER – HACKTIVIST – HACKTIVISM Copyright © 2019 Accenture Security. All rights reserved. Using hacking skills to spread a specific message and bring attention to a political or social cause or The use of malicious cyber activities by non-state actors for ideological purposes (iDefense) Hacktivist Hacker + Activist Combines traditional activist tactics with hacking techniques Hacktivism Hacker
  • 5. 5 HACKTIVISM Decline? Copyright © 2019 Accenture. All rights reserved. The Cult of the Dead Cow - the Dead Cow Died? Source: cDC Source: Google
  • 6. 6 HACKTIVISM Changing Face? Copyright © 2019 Accenture. All rights reserved. Source: Wikimedia
  • 7. 7 THE CHANGING FACE OF Hacktivism Copyright © 2019 Accenture. All rights reserved. Non-state Actors State Actors
  • 8. 8 THE CHANGING FACE OF Malicious Cyber Activities Breaking into No Breaking into Systems Systems Hacktivism Copyright © 2019 Accenture. All rights reserved.
  • 9. HACKTIVISM & THEDISINFORMATION AGE Copyright © 2019 Accenture. All rights reserved.
  • 10. Disinformation Propaganda Misinformation 10Copyright © 2019 Accenture. All rights reserved. INFORMATION OPERATIONS THREE TYPES & THREE DIMENSIONS
  • 11. DISINFORMATION OPERATIONS GOALS: THE “D” WORDS 11 DIVIDE DISCREDIT DISTRACT DENY Copyright © 2019 Accenture. All rights reserved.
  • 12. DISINFORMATION OPERATIONS METHODS 12 “WHITE” METHOD Broadcasting one’s message openly through state media “GRAY” METHOD Placing information in other sympathetic media “BLACK” METHOD Using hackers, trolls, and honeypots Copyright © 2019 Accenture. All rights reserved.
  • 13. 13 • Flooding the media with multiple versions of a story to confuse the audience • Publicizing scandalous information to discredit a critic or adversary • Distracting world opinion from negative information, by highlighting or even creating some other crisis or scandal • Using inauthentic social media profiles to inflame real- world violence by publicizing rallies of rival groups Copyright © 2019 Accenture. All rights reserved. DISINFORMATION OPERATIONS TACTICS
  • 14. 14 CYBER-ENABLED INFORMATION OPERATIONS Broadly Any information operations taking place in cyberspace, including in online media and social media Narrowly Information operations leveraging offensive cyber threat activity such as subverting secure system Copyright © 2019 Accenture. All rights reserved.
  • 15. 15 CYBER-ENABLED INFORMATION OPERATIONS Hacktivism Non-state actors for ideological purposes State-controlled hacktivism using false personas Copyright © 2019 Accenture. All rights reserved. State-encouraged hacktivism trolling
  • 16. 16 CASE STUDY: #MACRONLEAKS (PART I) • Disinformation campaign: rumors, fake news, forged documents • Offensive network intrusion: computers of Macron’s campaign staff • Spreading stolen data using trolls and bots Source: Reuters Copyright © 2019 Accenture. All rights reserved.
  • 17. CASE STUDY: #MACRONLEAKS (PART II) 17 • Spear phishing campaign • Hacktivist personas • Social media bots • Imagery board: 4chan SNAKEMACKEREL (APT 28) Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
  • 18. 18 SKATE Copyright © 2019 Accenture. All rights reserved. CASE STUDY: ENDLESS MAYFLY & OPERATION NEWSCASTER 1. Used typo-squatted domains to create inauthentic websites 2. Promoted these domains on social media platforms using inauthentic personas 3. Hosted malicious mobile applications 4. Leveraged “ephemeral disinformation” – Burn After Reading 18
  • 19. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 19 Cyber-nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” principle: “we will not attack unless we are attacked” Following key historical dates and international events involving in state’s interests
  • 20. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 20 Fandom Nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” through social media Following international events involving in state’s interests
  • 21. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 21 Diba Expedition Copyright © 2019 Accenture. All rights reserved. Actor: Warriors/Crusaders Weapon: Emoji packs Battlefield: Social media platforms Goal: National unity?
  • 22. WHEREISTHIS HEADING? 22Copyright © 2019 Accenture. All rights reserved.
  • 23. 23 This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY HACKING
  • 24. A FOREVER WAR OF DECEPTION: DEEPFAKES EMERGE 24
  • 25. 25 SUGGESTIONS • Follow geopolitical events • Set social media policies • Filter inauthentic accounts • Verify claims • Investigate information sources Copyright © 2019 Accenture. All rights reserved.