O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Linking attacks to threat actors: case studies

1.018 visualizações

Publicada em

In this talk, Kurt Baumgartner will examine recent APT alerts and discussions, and how to get the jump on how or why this malware is connected with past activity. In particular, we will start with 2020 Kwampirs and Lazarus reporting and present details on these malware techniques. See the talk - https://www.brighttalk.com/webcast/15591/414427/great-ideas-powered-by-sas-malware-attribution-and-next-gen-iot-honeypots?utm_source=twitter&utm_medium=social&utm_campaign=gl_Espo_je0066&utm_content=link&utm_term=gl_twitter_organic_vhodkkt66zpvmhb

Publicada em: Internet
  • Seja o primeiro a comentar

Linking attacks to threat actors: case studies

  1. 1. • • • •
  2. 2. Darkhotel - part 2 MsnMM Campaigns Satellite Turla Wild Neutron Blue Termite Spring Dragon 2011 2010 2013 Stuxnet Duqu 2012 Gauss Flame Mini Flame NetTraveler Miniduke RedOctober Icefog Winnti Kimsuky TeamSpy 2014 Epic Turla CosmicDuke Regin Careto / The Mask Energetic Bear / Crouching Yeti Darkhotel 2015 Desert Falcons Hellsing Sofacy Carbanak Equation Naikon Animal Farm Duqu 2.0 ProjectSauron Saguaro StrongPity Ghoul Fruity Armor ScarCruft 2016 Poseidon Lazarus Lurk GCMan Danti Adwind Dropping Elephant Metel Shamoon 2.0 WannaCry Moonlight Maze WhiteBear Silence 2017 ShadowPad BlueNoroff ExPetr/NotPetya ATMitch BlackOasis StoneDrill
  3. 3. • • • • •
  4. 4. • • • • •
  5. 5. • • •
  6. 6. • • •
  7. 7. • • • • •
  8. 8. • • • • • •

×