Identification of the malicious group’s digital trace using cryptography tools

Authors

  • Oleh Kozlenko National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Yuliia Nakonechna National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Mykhailo Mokhonko National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

DOI:

https://doi.org/10.20535/tacs.2664-29132025.3.344608

Abstract

Every year, information about a new data leak or compromise of a public or private organization becomes more commonplace in everyday life. The most dangerous and effective in this field are special hacker groups whose funding is associated with special government agencies or services. The study of the activities of these groups has led to identification of each unique method (or tactics, techniques and procedures - TTP) and systematization of the findings. The advantage of creating a digital fingerprint of APT groups is to quickly identify similarities in TTPs and compare these intervention attempts with known groups or compare the means of existing groups with new ones for which there is little information.

Downloads

Published

2025-12-28

Issue

Section

Algorithms and methods of cyber attacks prevention and counteraction