Skip to main content

Worked Examples: Attribution

Purpose

Show how to downgrade weak attribution and write defensible confidence statements.

Weak Attribution Claim

This intrusion was Actor X because the victim is in Actor X's target sector and the malware name appears in prior reports.

Problems:

  • Victimology is supporting evidence, not proof.
  • Shared malware or tooling may be reused.
  • No infrastructure, timing, operator behavior, or source-confirmed overlap is cited.
  • No competing hypotheses are documented.

Corrected Attribution Claim

Assessment:
The intrusion is consistent with reporting on Actor X, but attribution remains low confidence.

Evidence:
- Reported: Source A links similar malware behavior to Actor X.
- Observed: Local telemetry shows matching process and network behavior.
- Gap: No source-confirmed infrastructure overlap, malware configuration match, or operator handoff evidence.

Competing hypotheses:
- Criminal reuse of public or leaked tooling.
- Different state-linked cluster using similar procedures.
- Legitimate administrative activity followed by unrelated malware.

Evidence Strength Ladder

StrengthEvidence TypeAttribution Value
WeakShared ATT&CK techniqueCommon behavior; not enough.
WeakBroad victimologyContext only.
ModerateReused infrastructure in same time windowUseful if not shared hosting.
ModerateSimilar malware configurationStronger if rare and time-bound.
StrongSource-confirmed operational handoff or unique operator mistakeHigh value but still requires caveats.
StrongMultiple independent sources with technical overlapSupports higher confidence when contradictions are handled.

Confidence Statement

Medium confidence:
The assessment rests on two independent vendor reports and one local telemetry match. Confidence is limited because the infrastructure is hosted on a common provider and no exclusive malware configuration has been recovered.