Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

Автор: DEFCONConference

Загружено: 2022-10-20

Просмотров: 44205

Описание:

Advanced Persistent Threat groups invest in developing their arsenal of exploits and malware to stay below the radar and persist on the target machines for as long as possible. We were curious if the same efforts are invested in the operation security of these campaigns.

We started a journey researching active campaigns from the Middle East to the Far East including the Palestinian Authority, Turkey, and Iran, Russia, China, and North Korea. These campaigns were both state-sponsored, surveillance-targeted attacks and large-scale financially-motivated attacks.

We analyzed every technology used throughout the attack chain: Windows (Go-lang/.Net/Delphi) and Android malware; both on Windows and Linux-based C2 servers.

We found unbelievable mistakes which allow us to discover new advanced TTPs used by attackers, for example: bypassing iCloud two-factor authentication' and crypto wallet and NFT stealing methods. We were able to join the attackers' internal groups, view their chats, bank accounts and crypto wallets. In some cases, we were able to take down the entire campaign.

We will present our latest breakthroughs from our seven-year mind-game against the sophisticated Infy threat actor who successfully ran a 15-year active campaign using the most secured opSec attack chain we've encountered. We will explain how they improved their opSec over the years and how we recently managed to monitor their activity and could even cause a large-scale misinformation counterattack.

We will conclude by explaining how organizations can better defend themselves.

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 30 - Sick Codes -  Hacking the Farm = Breaking Badly into Agricultural Devices

DEF CON 30 - Sick Codes - Hacking the Farm = Breaking Badly into Agricultural Devices

DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War

DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War

Compromising LLMs: The Advent of AI Malware

Compromising LLMs: The Advent of AI Malware

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

7MS #671: Pentesting GOAD (Game of Active Directory)

7MS #671: Pentesting GOAD (Game of Active Directory)

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev

Как избежать ловушек и ловушек FED

Как избежать ловушек и ловушек FED

DEF CON 33 — Breakin 'Em All — Преодоление античит-механизма Pokemon Go — Тал Скверер

DEF CON 33 — Breakin 'Em All — Преодоление античит-механизма Pokemon Go — Тал Скверер

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

Хакер демонстрирует самые безумные гаджеты в своем EDC

Хакер демонстрирует самые безумные гаджеты в своем EDC

Inside the Persistent Mind of a Chinese Nation-State Actor

Inside the Persistent Mind of a Chinese Nation-State Actor

OPSEC: Because Jail is for wuftpd - The Grugq - Ekoparty 2012

OPSEC: Because Jail is for wuftpd - The Grugq - Ekoparty 2012

Двухфакторная аутентификация (2FA). Афера века. Защитная стратегия.

Двухфакторная аутентификация (2FA). Афера века. Защитная стратегия.

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

When Cybercriminals with Good OpSec Attack

When Cybercriminals with Good OpSec Attack

Black Hat 2013 - OPSEC Failures of Spies

Black Hat 2013 - OPSEC Failures of Spies

DEF CON 31: Военные истории — Отслеживание самых глупых кибернаёмников в мире — Купер Квинтин

DEF CON 31: Военные истории — Отслеживание самых глупых кибернаёмников в мире — Купер Квинтин

Почему мы верим телефонным мошенникам? — Семихатов, Ениколопов

Почему мы верим телефонным мошенникам? — Семихатов, Ениколопов

Private Investigator's Guide To Personal Data Security (OPSEC 101)

Private Investigator's Guide To Personal Data Security (OPSEC 101)

Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]