Enviar pesquisa
Carregar
Not-so Passive Sonar - Red October
•
1 gostou
•
1,006 visualizações
Kurt Baumgartner
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 8
Recomendados
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
Recomendados
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
Mais conteúdo relacionado
Mais procurados
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
Mais procurados
(20)
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Osint {open source intelligence }
Osint {open source intelligence }
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Cyber crime trends in 2013
Cyber crime trends in 2013
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cybersecurity and data privacy
Cybersecurity and data privacy
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
Hacking and privacy threats
Hacking and privacy threats
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
Internet Identifier SSR
Internet Identifier SSR
Destaque
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
שיוף סריגים
שיוף סריגים
goodvibes
AntiRE en Masse
AntiRE en Masse
Kurt Baumgartner
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
goodvibes
WiFi Insecurity2013
WiFi Insecurity2013
Kurt Baumgartner
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Kurt Baumgartner
Jamcracker
Jamcracker
Steve Crawford
Destaque
(8)
Learning With New Media
Learning With New Media
Recent Rogueware
Recent Rogueware
שיוף סריגים
שיוף סריגים
AntiRE en Masse
AntiRE en Masse
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
WiFi Insecurity2013
WiFi Insecurity2013
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Jamcracker
Jamcracker
Semelhante a Not-so Passive Sonar - Red October
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
PR Americas
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
data68
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk
Splunk for Security
Splunk for Security
Gabrielle Knowles
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
Insider threat webinar slides no cn
Insider threat webinar slides no cn
DevOps.com
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Yuriy Yuzifovich
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Brian Metzger
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
SelectedPresentations
Corporate threat vector and landscape
Corporate threat vector and landscape
yohansurya2
Semelhante a Not-so Passive Sonar - Red October
(20)
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk for Security
Splunk for Security
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
Insider threat webinar slides no cn
Insider threat webinar slides no cn
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
Corporate threat vector and landscape
Corporate threat vector and landscape
Último
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Último
(20)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Not-so Passive Sonar - Red October
1.
Red October Tracking
Active CyberSONAR in 2012 Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team
2.
Long-Running Cyber-surveillance Campaign Perspectives
of Red October intelligence gathering Advanced Cyberespionage Network Unique Architecture Broad Target Variety Exploit Scrubbing Attacker Identifiers
3.
Advanced Cyberespionage Network Your
conclusions were all wrong, Ryan
4.
Unique Architecture Y'know, I
seen me a mermaid once. I even seen me a shark eat an octopus. Over 1,000 related files collected
5.
Broad Target Variety Various
diplomats, government agencies, geopolitical financial centers, and more Sources: 2012 KSN Data + Sinkhole activity
6.
Exploit Scrubbing Scrubbed CN-APT
spear Scrubbed CN-APT spear • CVE-2012-0158 • CVE-2010-3333 • CVE-2009-3129 Custom decoys Timely, relevant names Ongoing detection, AV-evasion, Advanced Exploit Prevention
7.
Attacker Identifiers Classifying and
locating Historical WHOIS Compiled Artifacts
8.
Thank You Questions,
comments, criticism? Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team kurt.baumgartner@kaspersky.com