Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

7/2/2019
04:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

'Human Side-Channels': Behavioral Traces We Leave Behind

How writing patterns, online activities, and other unintentional identifiers can be used in cyber offense and defense.

As we move throughout our digital lives, we unknowingly leave traces — writing styles, cultural references, behavioral signatures — that can be compiled to form a profile of our online personas.

These identifiers are different from physical identifiers such as fingerprints, faces, handwriting, DNA, and voice, all of which allow law enforcement to trace crimes back to offenders and enable biometric authentication tools. But physical identifiers are often irrelevant when it comes to tracking criminals in the digital realm, where non-physical traits can prove useful.

Matt Wixey, head of technical research for PwC's cybersecurity practice in the UK, calls these behavioral identifiers "human side-channels" and says they often result from human actions. Human side-channels, he explains, are rooted in personality psychology and result from each individual's unique experiences, training, and feedback. We often don't know we exhibit them.

"These are ways you can be identified or tracked via unintentional or inadvertent leakage of behaviors," he says, adding that these traits are "predominantly unintentional."

While there are many behavioral traces to explore, Wixey chose forensic linguistics to explain how human side-channels can be used in offensive and defensive security. Linguistics is by no means a new discipline, but as a former law enforcement official-turned-cybersecurity researcher, he has found the study practical for investigating both physical and virtual crimes.

"It's kind of a spin-off of applied linguistics," he explains. "The principle is that everyone has a unique style of writing," not necessarily in terms of their handwriting but in how people construct sentences and paragraphs, as well as how they use punctuation and grammar. From a defensive perspective, this could be handy if a cybercriminal wrote any text in conjunction with the attack: a spearphishing email, for example, or a ransom note or text message.

Of course, the usefulness of a piece of text depends on how much is available to the investigator. "There are some things you can do just with the text itself," says Wixey, and when you have a piece of text, it's easier and more cost-effective to avoid a full forensic analysis. There are several ways security pros can leverage forensic linguistics, all of which vary depending on the resources they have and how prepared they are to invest in this technique.

As an example, let's say an organization was hit with a spearphishing attack. In the malicious email, analysts can seek unusual construction of sentences or stand-out phrases, and paste those into a search engine to see if they appear anywhere else on the Internet. This tactic has been used in real-world offenses, Wixey says, and it's a jumping-off point for further investigation.

If an unusual phrase appears in a recent forum post, it could prove useful to read through the forum for messages talking about the attack, or other clues that could provide more insight on what happened. The forum could also be passed to law enforcement as a possible lead.

Forensic linguistics can also be helpful in comparing social media accounts. If the same person operates multiple Twitter accounts, he adds, you may be able to tie both to one operator. This could prove useful in investigating disinformation campaigns or identifying extortion, fraud, or another psychological agenda.

With more time and resources, Wixey continues, a full-time attack investigator or threat intelligence analyst could compile a corpus, or collection, of text from different actors and sources. As they build a collection of ransom messages, tweets, and forum posts, they can compare future attacker texts to those in their repository and see if any matches exist.

"It's still below the radar in terms of most security practitioners' awareness," he says, adding that "it's just not most people's standard investigative protocols."

Writing in Disguise
Although these human side-channels are deeply ingrained into an individual's personal writing style, Wixey says there are ways people attempt to disguise them. With respect to forensic linguistics, they may run a text through Google Translate a dozen times and continuously tweak the text so its meaning is consistent, but the voice and structure are concealed. It's a "pretty primitive" strategy, he says, but it's also easy to automate. Another tactic is to collaborate with someone else on writing a piece of text so the two styles are scrambled.

At Black Hat USA, Wixey will examine multiple human side-channels, how they can be used in attacks and defense, privacy implications, and how they can be countered in his briefing, "I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy."

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/3/2019 | 3:28:53 PM
We Live Forever
Our digital footprint outlives us.  A few years ago a very dear friend and brilliant computer enginer passed away but his FB account remains alive and active with postings from friends - so even if YOU are no longer with us, YOU can still be a participant in community work.  And if you are a hacker, now you have footprint of somebody no longer able to sue or address you.  Think about that one too. 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5098
PUBLISHED: 2019-12-05
An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be trigger...
CVE-2012-1104
PUBLISHED: 2019-12-05
A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
CVE-2019-17387
PUBLISHED: 2019-12-05
An authentication flaw in the AVPNC_RP service in Aviatrix VPN Client through 2.2.10 allows an attacker to gain elevated privileges through arbitrary code execution on Windows, Linux, and macOS.
CVE-2019-17388
PUBLISHED: 2019-12-05
Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications.
CVE-2019-18381
PUBLISHED: 2019-12-05
Norton Password Manager, prior to 6.6.2.5, may be susceptible to a cross origin resource sharing (CORS) vulnerability, which is a type of issue that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served.