Who Gets to Point Fingers? Technical Capacity and International Accountability
This talk analyzes the evolution of public cyber attribution, focusing on how states and private entities use it as a tool for diplomatic signaling and norm-setting. It examines the shift from private-sector-led reporting to state-led, multi-stakeholder, and cross-regional attribution efforts. The presentation highlights the strategic use of attribution to impose reputational costs and establish consensus on unacceptable state behavior in cyberspace.
The Geopolitics of Attribution: Why Your Threat Intel Needs a Reality Check
TLDR: Public cyber attribution has evolved from a technical exercise into a sophisticated tool for diplomatic signaling and norm-setting. While researchers often focus on the "who" behind an attack, states are increasingly using attribution to impose reputational costs and build coalitions against unacceptable behavior. Understanding this shift is critical for threat hunters who need to distinguish between technical evidence and the political narratives that often surround high-profile breaches.
Technical attribution is rarely just about the code. When we look at the history of public attribution, we see a clear trajectory: it started in the private sector, moved to state-led indictments, and has now settled into a complex, multi-stakeholder game of international accountability. For those of us in the trenches, it is easy to get lost in the weeds of TTPs and infrastructure analysis. However, ignoring the "why" behind an attribution report is a mistake. If you are building a threat intelligence program, you need to understand that the attribution you see in the news is often a deliberate, calibrated act of statecraft rather than a simple forensic conclusion.
The Evolution of the Attribution Playbook
The shift in how states handle attribution is best illustrated by the move away from the "usual suspects" model. In the early days, attribution was often a binary, private-sector-led affair. Think of the Mandiant APT1 report, which set the standard for linking specific infrastructure to state-backed units. That was a technical milestone. But today, the game has changed. We are seeing a move toward cross-regional, multi-state coalitions that use attribution to signal red lines.
When a country like Germany or the Czech Republic attributes an attack to a specific actor, they aren't just filing a bug report. They are engaging in a diplomatic process. They are using the UN norms of responsible state behavior as a benchmark to define what is "unacceptable." This is a crucial distinction for researchers. If you are analyzing a campaign against critical infrastructure, you have to ask yourself: is this report meant to help me patch, or is it meant to pressure a foreign government?
The Mechanics of Diplomatic Signaling
Attribution is now a primary tool for imposing reputational costs. When a state publicly names an actor, they are effectively trying to dismantle that actor's operational freedom. By forcing an adversary to regroup, retool, and re-acquire infrastructure—often using techniques like T1583 (Acquire Infrastructure)—the state creates a tangible cost for the attacker.
This is not always about technical perfection. In fact, the technical evidence is sometimes secondary to the political goal. We see this in the way states handle "middle-ground" actors. Some countries are hesitant to name a state directly, preferring to condemn the "behavior" rather than the "actor." This allows them to maintain diplomatic channels while still signaling that a line has been crossed. For a pentester or a researcher, this means the "truth" of an attribution report is often filtered through a lens of geopolitical constraint.
Why the Global South is Changing the Game
One of the most interesting trends in the last year is the emergence of Global South countries in the attribution space. For a long time, attribution was a Western-dominated activity. That is no longer the case. When a country like Samoa calls out an actor like APT40, it signals a shift in the power dynamics of threat intelligence.
These countries are not just passive consumers of Western threat intel. They are building their own capacity, developing their own Computer Emergency Response Teams (CERTs), and, most importantly, they are deciding when and how to speak up. This is a massive development for the industry. It means that the "rules of the road" for cyberspace are being rewritten by a much broader group of stakeholders. If you are a researcher, you need to be aware of these new voices. They are not necessarily following the same playbooks as the Five Eyes, and their attribution reports might prioritize different technical indicators or political outcomes.
What This Means for Your Workflow
If you are a pentester or a researcher, you need to treat attribution reports with the same skepticism you apply to any other piece of data. Don't just look at the IOCs. Look at the context. Who published the report? What is the diplomatic relationship between the victim and the attacker? Is the report focused on technical remediation, or is it part of a broader campaign to build a coalition?
The next time you see a high-profile attribution, don't just ask "how did they find this?" Ask "why are they telling us now?" The answer to that question will tell you more about the current state of global cyber conflict than any IP address or malware hash ever could. We are moving into an era where technical capacity is just one part of the equation. The ability to manage and counter the political fallout of an attribution—to navigate the diplomatic game—is becoming just as important as the ability to reverse-engineer a binary. Keep your eyes on the Global Partnership for Responsible Cyber Behavior and similar initiatives. They are the ones defining the future of how we talk about, and act upon, the threats we face every day.
Target Technologies
Attack Techniques
Up Next From This Conference

From Skip-Kid to Cyber Kingpin: Preventing the Predictable Progression

Inside the Ransomware Machine

Who Gets to Point Fingers? Technical Capacity and International Accountability
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies

