{"id":8316,"date":"2017-07-12T02:30:24","date_gmt":"2017-07-12T10:30:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/12\/news-2090\/"},"modified":"2017-07-12T02:30:24","modified_gmt":"2017-07-12T10:30:24","slug":"news-2090","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/12\/news-2090\/","title":{"rendered":"Mingis on Tech: The language of malware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2017\/02\/cw_audio_teaser_mingis_on_tech_3x2_primary_1800x1200-100710181-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Ken Mingis, \t\t\t\t\t\t \t\t\t\t\t\t\tFahmida Y. Rashid| Date: Wed, 12 Jul 2017 03:00:00 -0700<\/strong><\/p>\n<p>Sometimes, <em>how<\/em> you say something can be as important as what you say &#8212; especially when&#8217;s there been a cyberattack and law enforcement officials are trying to figure out who you are.<\/p>\n<p>That&#8217;s what <a href=\"http:\/\/www.csoonline.com\/author\/Fahmida-Y.-Rashid\/\" target=\"_blank\"><em>CSO<\/em> senior writer Fahmida Rashid<\/a> found when she <a href=\"http:\/\/www.csoonline.com\/article\/3200545\/security\/why-linguistics-cant-always-identify-cyber-attackers-nationality.html\" target=\"_blank\">looked into how cybersecurity firms go about tracking down the bad actors<\/a> behind malware campaigns.\u00a0While linguistics may not be the first thing companies worry about when trying to protect &#8212; or retrieve access to &#8212; their data, it can help pinpoint an attack&#8217;s origin, Rashid told <em>Computerworld<\/em> Executive Editor Ken Mingis.<\/p>\n<p>Linguistics analysis has been used to investigate various attacks, including the 2014 Sony breach, ShadowBrokers and <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/d7ydwy\/why-does-dnc-hacker-guccifer-20-talk-like-this\" target=\"_blank\">Guccifer 2.0<\/a>\u00a0&#8212; and it\u00a0seems to be gaining traction \u00a0because it can help identify the shadowy figures behind ransomware attacks, Rashid said. For example, Flashpoint analysts analyzed every language version of the ransom notes that accompanied WannaCry, and determined that the notes written in Bulgarian, French, German, Italian, Japanese, Korean, Russian, Spanish and Vietnamese had been translated from a note originally written in English. (In the CoinVault ransomware attack, investigators found several phrases in \u201cperfect Dutch,\u201d <a href=\"http:\/\/www.theregister.co.uk\/2015\/09\/18\/coinvault_ransomware_arrests_dutch_netherlands\/\" target=\"_blank\">indicating a Dutch connection<\/a>.)<\/p>\n<p>Ransomware lends itself well to linguistic analysis because when attackers write the \u00a0ransom notes their speech patterns show up in the text. There happens to be more text to analyze, and unlike spam and phishing messages where attackers have to \u00a0mimic legitimate entities, ransom notes can hide clues on how comfortable the writer is in that language.<\/p>\n<p>The fascinating part, according to Rashid, is that linguists can learn about attackers by the way they phrase certain words, or even by the words themselves. That&#8217;s <a href=\"http:\/\/www.computerworld.com\/article\/3196680\/security\/wannacry-ransomware-attacks-wont-be-the-last.html\">particularly true of ransomware like WannaCry<\/a>, where victims get a message from the attackers &#8212; and that message can contain hidden clues.\u00a0Linguists like<a href=\"https:\/\/science.iit.edu\/people\/faculty\/shlomo-argamon\" target=\"_blank\"> Shlomo Argamon<\/a>, professor of computer science at the Illinois Institute of Technology, say it\u2019s important to have as much text as possible to analyze. The more there is, the more likely the \u201ctrue\u201d attributes can be surfaced.<\/p>\n<p><a href=\"http:\/\/www.csoonline.com\/article\/2881469\/malware-cybercrime\/whodunit-in-cybercrime-attribution-is-not-easy.html\" target=\"_blank\">It&#8217;s not fool-proof<\/a>, Rashid noted. Different people can speak multiple languages and with differing degrees of proficiency, sometimes obscuring an attack&#8217;s origin. Attackers regularly employ red herrings and false flags to throw investigators off; they \u00a0manipulate when they launch attacks; change timestamps; and even intentionally insert cultural references and phrases to misdirect investigators. Even so, it is hard to consistently plant fake clues in speech.<\/p>\n<p>For an audio podcast only, click play (or catch up on all episodes) below. Or you can\u00a0<a href=\"http:\/\/buy.geni.us\/Proxy.ashx?TSID=14159&amp;GR_URL=https%3A%2F%2Fitunes.apple.com%2Fus%2Fpodcast%2Fmingis-on-tech%2Fid1210136048\" target=\"_blank\">now find us on iTunes<\/a>, where you can download each episode and listen at your leisure.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/w.soundcloud.com\/player\/?url=https%3A\/\/api.soundcloud.com\/playlists\/193178942&amp;color=ff5500&amp;auto_play=false&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>Happy listening, and please,\u00a0<a href=\"mailto:editor@computerworld.com\">send feedback or suggestions<\/a>\u00a0for future topics to us. We&#8217;d love to hear from you.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3207624\/security\/mingis-on-tech-the-language-of-malware.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2017\/02\/cw_audio_teaser_mingis_on_tech_3x2_primary_1800x1200-100710181-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Ken Mingis, \t\t\t\t\t\t \t\t\t\t\t\t\tFahmida Y. Rashid| Date: Wed, 12 Jul 2017 03:00:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Sometimes, <em>how<\/em> you say something can be as important as what you say &#8212; especially when&#8217;s there been a cyberattack and law enforcement officials are trying to figure out who you are.<\/p>\n<p>That&#8217;s what <a href=\"http:\/\/www.csoonline.com\/author\/Fahmida-Y.-Rashid\/\" target=\"_blank\"><em>CSO<\/em> senior writer Fahmida Rashid<\/a> found when she <a href=\"http:\/\/www.csoonline.com\/article\/3200545\/security\/why-linguistics-cant-always-identify-cyber-attackers-nationality.html\" target=\"_blank\">looked into how cybersecurity firms go about tracking down the bad actors<\/a> behind malware campaigns.\u00a0While linguistics may not be the first thing companies worry about when trying to protect &#8212; or retrieve access to &#8212; their data, it can help pinpoint an attack&#8217;s origin, Rashid told <em>Computerworld<\/em> Executive Editor Ken Mingis.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3207624\/security\/mingis-on-tech-the-language-of-malware.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11988,10629,714],"class_list":["post-8316","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-backup-recovery","tag-cyberattacks","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8316"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8316\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8316"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}