Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

7/2/2019
04:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

'Human Side-Channels': Behavioral Traces We Leave Behind

How writing patterns, online activities, and other unintentional identifiers can be used in cyber offense and defense.

As we move throughout our digital lives, we unknowingly leave traces — writing styles, cultural references, behavioral signatures — that can be compiled to form a profile of our online personas.

These identifiers are different from physical identifiers such as fingerprints, faces, handwriting, DNA, and voice, all of which allow law enforcement to trace crimes back to offenders and enable biometric authentication tools. But physical identifiers are often irrelevant when it comes to tracking criminals in the digital realm, where non-physical traits can prove useful.

Matt Wixey, head of technical research for PwC's cybersecurity practice in the UK, calls these behavioral identifiers "human side-channels" and says they often result from human actions. Human side-channels, he explains, are rooted in personality psychology and result from each individual's unique experiences, training, and feedback. We often don't know we exhibit them.

"These are ways you can be identified or tracked via unintentional or inadvertent leakage of behaviors," he says, adding that these traits are "predominantly unintentional."

While there are many behavioral traces to explore, Wixey chose forensic linguistics to explain how human side-channels can be used in offensive and defensive security. Linguistics is by no means a new discipline, but as a former law enforcement official-turned-cybersecurity researcher, he has found the study practical for investigating both physical and virtual crimes.

"It's kind of a spin-off of applied linguistics," he explains. "The principle is that everyone has a unique style of writing," not necessarily in terms of their handwriting but in how people construct sentences and paragraphs, as well as how they use punctuation and grammar. From a defensive perspective, this could be handy if a cybercriminal wrote any text in conjunction with the attack: a spearphishing email, for example, or a ransom note or text message.

Of course, the usefulness of a piece of text depends on how much is available to the investigator. "There are some things you can do just with the text itself," says Wixey, and when you have a piece of text, it's easier and more cost-effective to avoid a full forensic analysis. There are several ways security pros can leverage forensic linguistics, all of which vary depending on the resources they have and how prepared they are to invest in this technique.

As an example, let's say an organization was hit with a spearphishing attack. In the malicious email, analysts can seek unusual construction of sentences or stand-out phrases, and paste those into a search engine to see if they appear anywhere else on the Internet. This tactic has been used in real-world offenses, Wixey says, and it's a jumping-off point for further investigation.

If an unusual phrase appears in a recent forum post, it could prove useful to read through the forum for messages talking about the attack, or other clues that could provide more insight on what happened. The forum could also be passed to law enforcement as a possible lead.

Forensic linguistics can also be helpful in comparing social media accounts. If the same person operates multiple Twitter accounts, he adds, you may be able to tie both to one operator. This could prove useful in investigating disinformation campaigns or identifying extortion, fraud, or another psychological agenda.

With more time and resources, Wixey continues, a full-time attack investigator or threat intelligence analyst could compile a corpus, or collection, of text from different actors and sources. As they build a collection of ransom messages, tweets, and forum posts, they can compare future attacker texts to those in their repository and see if any matches exist.

"It's still below the radar in terms of most security practitioners' awareness," he says, adding that "it's just not most people's standard investigative protocols."

Writing in Disguise
Although these human side-channels are deeply ingrained into an individual's personal writing style, Wixey says there are ways people attempt to disguise them. With respect to forensic linguistics, they may run a text through Google Translate a dozen times and continuously tweak the text so its meaning is consistent, but the voice and structure are concealed. It's a "pretty primitive" strategy, he says, but it's also easy to automate. Another tactic is to collaborate with someone else on writing a piece of text so the two styles are scrambled.

At Black Hat USA, Wixey will examine multiple human side-channels, how they can be used in attacks and defense, privacy implications, and how they can be countered in his briefing, "I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy."

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/3/2019 | 3:28:53 PM
We Live Forever
Our digital footprint outlives us.  A few years ago a very dear friend and brilliant computer enginer passed away but his FB account remains alive and active with postings from friends - so even if YOU are no longer with us, YOU can still be a participant in community work.  And if you are a hacker, now you have footprint of somebody no longer able to sue or address you.  Think about that one too. 
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...