SlideShare a Scribd company logo
FORENSIC)INSIGHT;)
DIGITAL)FORENSICS)COMMUNITY)IN)KOREA
forensic.n0fate.com
APT
Cyber-espionageThreat
forensicinsight.org
Contents
• APT?
• LuckyCat APT
• Heartbeat APT
• Flashback & Dockster.A
• Conclusion
forensicinsight.org
APT?
forensicinsight.org
APT?
forensicinsight.org
Classification
Cyber-espionage, spying Criminal syndicate
money, money, moneyEnemy secrets leaked
forensicinsight.org
APT
• Advanced Persistent Threat
• 외국 정부기관과 같은 그룹의 정보를 지속적
이고 효과적으로 유출하는 위협을 말함
• 정보 수집 기술을 통해 민감한 정보에 접근하
는 인터넷을 통한 스파이 활동 뿐만 아니라 고
전 스파이 활동을 포함.
forensicinsight.org
APT
• Advanced : intelligence-gathering
techniques (such as telephone-
interception, satellite imaging)
• Persistent :“low-and-slow” approach
• Threat : they have both capability and
intent.
forensicinsight.org
APT - Life Cycle
Reference : http://en.wikipedia.org/wiki/File:Advanced_Persistent_Threat_Chart.png
forensicinsight.org
Case
• LuckyCat APT
• Inside an APT Campaign with Multiple Targets in India and Japan : http://
www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-
papers/wp_luckycat_redux.pdf
• The HeartBeat APT
• The HeartBeat APT Campaign : http://www.trendmicro.com/cloud-
content/us/pdfs/security-intelligence/white-papers/wp_the-heartbeat-apt-
campaign.pdf
• Flashback and Dockster.A Malware
forensicinsight.org
LuckyCat APT
forensicinsight.org
Major Target
forensicinsight.org
Diversity of Target
India Military
Research Institution
Japanese Tibetan
Activist Community
forensicinsight.org
Diversity of Target
• ~ June, 2011
• has been linked to 90 attacks against
targets in japan and india as well as
tibetan activists
• Luckycat campaign managed to
compromise 233 computers
• Target OS :Windows, Mac OS X,Android
forensicinsight.org
Example of Luckycat
attacks (Japan)
• Time : the confusion after the Great East Japan
Earthquake and the Fukushima Nuclear Power
Plant accident.
• Vulnerability :Adobe Reader-CVE-2010-2883
• decoy document : radiation dose measurement
results which where published on the Tokyo Power
Electric Company (TEPCO) website.
forensicinsight.org
Example of Luckycat
attacks (Japan)
forensicinsight.org
Example of Luckycat
attacks (India)
• Time : 2010 ~ 2012
• Vulnerability : Microsoft Office-
CVE-2010-3333
• decoy document : information on India’s
ballistic missile defense program.
forensicinsight.org
Example of Luckycat
attacks (India)
forensicinsight.org
Example of Luckycat
attacks (Tibet)
• Time : 2010 ~ 2012
• Vulnerability : Microsoft Office-
CVE-2010-3333
• decoy document : .DOC attachments that
leverage Tibetan themes
forensicinsight.org
Example of Luckycat
attacks (Tibet)
forensicinsight.org
Diversity of Malware
• five malware families either utilized by or
hosted on the same dedicated server
• first-stage malware prove very simplistic
• Some were used as second-stage malware
• attackers pushed to victims whose
network were compromised by first-
stage malware
forensicinsight.org
Diversity of
Infrastructure
• Luckycat use free web-hosting services that
provide a diversity of domain name as well
as IP addresses
• the attackers alse made use of Virtual
Private Servers(VPSs) that not only housed
their primary malware - TROJ_WIMMIE
but other as well.
• These servers may also act an anchors
forensicinsight.org
Diversity of Infrastructure
... free web-hosting
services
Victims
Virtual Private Server
Attacker
forensicinsight.org
Operations
TROJ_WIMMIE
1. send to spear phishing email(or SMS)
3. connects to a C&C
server via HTTP over port
80
VBS_WIMMIE
forensicinsight.org
LuckyCat
• VBS_WIMMIE registers a script that work
as a backdoor to the WMI event handler
and deletes files associated with it or
TROJ_WIMMIE
• TROJ_WIMMIE is a remote access malware
that make it easy to gather data form the
infected computer without noticing what is
happening
forensicinsight.org
Initial Communication
• The compromised computer posts data to
PHP script that runs on the C&C server
forensicinsight.org
Initial Communication
• The initial communication results in the
creation of a empty file on the C&C server
that contains information on the
compromised computer.
• attackers use to identify which malware
attack caused the compromise:
• The attacker then creates a file with a
name that ends in @.c
forensicinsight.org
Initial Communication
• The compromised computer then
downloads the file and executes the
specified command
• Download/Upload file, Get external IP
Address, Execute shell command
• The compromised computer then sends
the output to the C&C server and delete
the command file
forensicinsight.org
Initial Communication
• One of the common initial commands
instructs the compromised computer to
upload the results of information-gathering
commands
• The resulting files are compressed using
the CAB compression format and uploaded
to the C&C server
forensicinsight.org
Initial Communication
systeminfo
tasklist
forensicinsight.org
Malware samples
forensicinsight.org
Campaign Connections
• ShadowNet
• Duojeen
• Sparksrv
• Comfoo
forensicinsight.org
ShadowNet
• sample targeted email with both Luckycat
and ShadowNet malware attachments
forensicinsight.org
ShadowNet
• Relationship between Luckycat and
shadowNet
forensicinsight.org
ShadowNet
• malware was configured to connect to two
blogs and aYahoo Group in order to find
the C&C server’s location.
forensicinsight.org
The HeartBeat APT
forensicinsight.org
Time
• The Heartbeat campaign has been
successfully executing targeted attacks
since Nov 2009 to June 2012.
forensicinsight.org
Targets
• The HeartBeat campaign appears to target
government organizations and institutions
or communities that are in some way
related to the South Korean government.
forensicinsight.org
Targets
Source : http://games.renpy.org/site_media/media/
screenshot/title-heartbeats-final.png
정당
작은 중소 업체
각 군
정책연구소
언론사
forensicinsight.org
Context
• June 2012 : first Heartbeat RAT component was
discovered in a Korean newspaper company network
• Further investigation revealed that the campaign has
been actively distributing their RAT component to
their targets in 2011 and the first half of 2012.
• Earlier versions of the HeartBeat campaign’s RAT
component contained the following strings in their
codes:
forensicinsight.org
AttackVector
• 악성코드의 구성
• 여러 파일이 포함된 하나의 실행파일 형태
• 확장자는 xxx.pdf.exe 형태로 구성
• 실행 파일의 아이콘은 문서 파일과 동일
• 실행 파일 내부에 정상 문서와 악성코드를 포함
• 정상적인 문서 파일에 암호가 걸려 있음
• 메일에 써있는 암호를 입력해야 함
forensicinsight.org
AttackVector
• Example of a decoy Adobe Reader
documents
forensicinsight.org
AttackVector
• 대통령에게 건의사항.hwp (Nov 2011)
forensicinsight.org
Infection Flow
forensicinsight.org
The RAT Component
• Backdoor Functionalities
• 동작 중인 프로세스 목록과 관련 프로세스 ID
• 파일 존재여부/생성시간/업로드/다운로드/실행/삭제
• 자기 자신을 업데이트/삭제
• 프로세스 생성/종료
• 제거 가능한/고정 드라이브 목록
• 원격 커맨드 쉘 오픈, 시스템 재부팅
forensicinsight.org
The RAT Component
• 설치와 영속성 설정
RAT executable files
• %System%msrt.exe
• %Program Files%Common FilesAcroRd32.exe
• %Program Files%Common Filesconfig.exe
• %Program Files%Common Filesexplorer.exe
.DLL component which contains the backdoor capabilities
• %Program Files%Common FilesServices6to4nt.dll
• %Program Files%Common FilesSystem6to4nt.dll
• %Program Files%Windows NTAccessories6to4nt.dll
• %Program Files%Windows NThtrn.dll
• %Program Files%Windows NThtrn_jls.dll
• %Program Files%Windows NThyper.dll
• %System%Network Remote.dll
• %System%SvcHost.dll
forensicinsight.org
The RAT Component
• 설치와 영속성 설정
• A DLL that uses
fake file
properties
forensicinsight.org
The RAT Component
• 설치와 영속성 설정
• 특정 경우에는 RAT 설치 시 2개의 DLL 파일을 생성함.
• 하나는 다른 DLL의 로더 역할을 수행함.
• 다른 하나는 백도어 페이로드를 가짐
• DLL 컴포넌트는 레지스트리 값을 추가하여 서비스를 등
록함.
• 서비스 등록은 설치 시점에 수행함.
forensicinsight.org
The RAT Component
• 설치와 영속성 설정
forensicinsight.org
The RAT Component
• 설치와 영속성 설정
• DLL은 매번 시스템이 실행될 때마다 서비스 형태로 로드.
• DLL은 로딩 시점에 svchost.exe 프로세스에 인젝션 됨.
• 설치 후에 RAT 설치관리자는 자기 자신을 삭제함.
• 시스템에는 DLL과 관련 레지스트리만 남음.
• 실제론 이 DLL이 모든 임무를 수행함.
forensicinsight.org
C&C Communication
• RAT의 . DLL 컴포넌트가 svchost.exe에 인젝
션되면, C&C 서버에 자기자신을 동록함.
• Computer name, Local IP, Service pack
• 그리고 패스워드(ex.“qawsed”)를 전송함.
• RAT은 보통 80포트를 사용하지만, 최근 버전
은 443이나 5600, 8080 포트를 사용하기도 함
forensicinsight.org
C&C Communication
• RAT’s C&C communication is encrypted
with XOR encryption using a sing byte key,
02H
forensicinsight.org
C&C Communication
• RAT’s decryption code upon receiving data
from the C&C server
forensicinsight.org
C&C Communication
Decryption
forensicinsight.org
C&C Communication
• the port, C&C address, campaign code and
password are hardcoded in the RAT’s
malware body in plain text
• however, In some RAT versions are
encrypted and are decrypted only during
run-time.
forensicinsight.org
Command and Control
• 도메인 중심으로 운영됨.
• 각 C&C사이트는 아르메니아, 미국, 일본, 인도, 대
한민국이 소유한 IP로 리다이렉트 됨.
• 모든 IP 주소는 합법적인 ISP의 소유
• 조사 결과 감염된 호스트를 프록시 서버로 이용하
여 모든 트래픽을 실제 C&C서버로 전송함.
• 즉, 중간에 하나의 레이어를 두어서 익명성을 향상
forensicinsight.org
Command and Control
... C&C proxy server
(compromised host)
Victims
C&C Server
Attacker
forensicinsight.org
Command and Control
forensicinsight.org
Relationships among
Domain, IPs, Campaigns
forensicinsight.org
Attribution
• 공격자의 흔적을 찾기가 쉽지 않음
• 점령된 호스트를 C&C 프록시 서버로 활용
• 몇몇 첨부문서 명이 중국어로 되어 있었음
• guohui, xuehui, minzhu
• C&C 도메인 명이나 도구의 문구는 모두 영문으로 작
성
• 제한적인 정보로 인해 가해자를 찾기 어려웠음.
forensicinsight.org
Defending against the
heartbeat campaign
• HeartBeat RAT 컴포넌트 관련 서비스를 비활성화
• 시스템 방화벽 활성화
• 소프트웨어와 운영체제 업데이트를 최신버전으로 적용
• 사용하지 않는 포트의 인바운드를 막는다.
• 네트워크 연결을 모니터링 한다.
• 신뢰 사이트 목록을 정기적으로 업데이트 한다.
• 메일에서VBS,BAT,EXE,PIF,SCR 파일을 방어하기 위해 이메일 서버를 재설정
• 알려지지 않은 소스의 링크나 첨부문서를 열지 않는다.
• 하나 이상의 확장자가 들어간 파일을 주의한다.
• 탐색기에서 숨겨진 파일과 확장자가 보이도록 설정한다..
• 로컬 컴퓨터의 로그인 정보를 저장하지 않는다.
forensicinsight.org
Flashback & Dockster.A
forensicinsight.org
Flashback - Infection
• Flashback is a Trojan horse affecting
personal computer systems running Mac
OS
• This Trojan has infected over 600,000 Mac
computers forming a botnet that includes
274 bots located in Cupertino, California
forensicinsight.org
Flashback - Details
compromised site
1. 점령 후 javascript
공격 코드 삽입
2. 사용자가 해당 사이트 접속
3. 자바 애플릿이 실행되면서
크래쉬 발생
4. Bang!!
forensicinsight.org
Flashback - Resolution
• Oracle fixed the vulnerability exploited to
install Flashback on Feb 14, 2012.
• Apple maintains the Mac OS X version of
Java and did not release an update
containing Apr 4, 2012 after exploited :(
• In Apr 12, 2012, the company issued a
further update to remove the most
common Flashback variants
forensicinsight.org
OSX/Dockster.A
• It has discovered a Dalai Lama related website is
compromised and is pushing new Mac malware,
call Dockster, using a Java-based exploit.
• Java-based exploit uses the same vulnerability as
“Flashback”, CVE-2012-0507
• The malware dropped, Backdoor:OSX/
Dockster.A, is basic backdoor with file download
and keylogger capabilities.
forensicinsight.org
OSX/Dockster.A
• There is also an exploit CVE-2012-4681 with a
windows-based payload:Win32/
Trojan.Agent.AXMO
• CVE-2012-4681 : Multiple vulnerabilities in the JRE
component in Oracle Java SE 7 Update 6 and
earlier allow remote attackers to execute arbitrary
code.
forensicinsight.org
OSX/Dockster.A
forensicinsight.org
OSX/Dockster.A
• whois information
dalailama.com
gyalwarinpoche.com
forensicinsight.org
OSX/Dockster.A
• why?
forensicinsight.org
OSX/Dockster.A
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$ file *
destmarc.jar: Zip archive data, at least v2.0 to extract
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$ unzip -d test
destmarc.jar
Archive: destmarc.jar
creating: test/META-INF/
... [SNIP] ....
inflating: test/file.tmp
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$ file test/*
test/META-INF: directory
test/Union1.class: compiled Java class data, version 50.0 (Java 1.6)
test/a.class: compiled Java class data, version 50.0 (Java 1.6)
test/b.class: compiled Java class data, version 50.0 (Java 1.6)
test/c.class: compiled Java class data, version 50.0 (Java 1.6)
test/d.class: compiled Java class data, version 50.0 (Java 1.6)
test/e.class: compiled Java class data, version 50.0 (Java 1.6)
test/f.class: compiled Java class data, version 50.0 (Java 1.6)
test/file.tmp: Mach-O universal binary with 2 architectures
test/file.tmp (for architecture ppc):	 Mach-O executable ppc
test/file.tmp (for architecture i386):	Mach-O executable i386
n0fate@n0fate-MacBook-Pro:~/Dropbox/malware/OSXDockster_Trojanaxmo/OSX$
forensicinsight.org
OSX/Dockster.A
fseventer : http://www.fernlightning.com/doku.php?id=software:fseventer:start
forensicinsight.org
OSX/Dockster.A
• hiding .Dockster Binary & process list
toms-Mac:~ tom$ ls -al
total 2368
drwxr-xr-x+ 22 tom staff 748 11 20 00:21 .
drwxr-xr-x 5 root admin 170 7 26 11:45 ..
-rw------- 1 tom staff 3 7 26 11:45 .CFUserTextEncoding
-rw-r--r--@ 1 tom staff 12292 11 20 00:12 .DS_Store
-rwxr-xr-x 1 tom staff 241621 11 29 2012 .Dockset
drwx------ 2 tom staff 68 11 19 23:54 .Trash
-rw------- 1 tom staff 262 11 20 00:04 .bash_history
drwx------+ 3 tom staff 102 7 26 11:45 Desktop
drwx------+ 3 tom staff 102 7 26 11:45 Documents
toms-Mac:~ tom$
forensicinsight.org
OSX/Dockster.A
• Register plist to LaunchAgents (AutoStart)
toms-Mac:~ tom$ cd Library/
toms-Mac:Library tom$ cd LaunchAgents/
toms-Mac:LaunchAgents tom$ ls
mac.Dockset.deman.plist
toms-Mac:LaunchAgents tom$ strings mac.Dockset.deman.plist
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST
1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict>
<key>Label</key>
<string>mac.Dockset.deman</string>
<key>OnDemand</key>
<false/>
<key>Program</key>
<string>/Users/tom/.Dockset</string>
<key>ProgramArguments</key>
<array>
<string>first</string>
</array> </dict> </plist>
toms-Mac:LaunchAgents tom$
forensicinsight.org
OSX/Dockster.A
• Dockset 의 인자가 key이면 바로 키로거를 실
행 함.
• 아닌 경우 인코딩된 설정 값을 불러와서 디코
딩을 수행 함.
forensicinsight.org
OSX/Dockster.A
• 하드코딩된 시간이 현재 시간보다 이전이면,
자기 자신을 삭제 후 종료
forensicinsight.org
OSX/Dockster.A
• 악성코드 설치 과정을 진행 함.
forensicinsight.org
OSX/Dockster.A
• Function List • list of IPs (itsec.eicp.net)
__Z18RunKeyLoggerThreadPv
__Z9RunThreadPFPvS_ES_
__Z11consultCS_Qic
__Z11cousultCS_Ric
....
_inv_shift_sub_rows
_aes_set_key
_update_encrypt_key_128
_update_decrypt_key_128
_update_encrypt_key_256
_mix_sub_columns
_inv_mix_sub_columns
_aes_decrypt_256
_aes_encrypt_256
_aes_decrypt_128
_aes_encrypt_128
_aes_decrypt
1.203.100.232
1.203.102.251
1.203.102.63
1.203.103.227
1.203.104.45
1.203.106.150
1.203.107.125
1.203.107.200
1.203.108.46
1.203.109.193
114.248.84.134
114.248.84.170
114.248.84.171
114.248.84.180
114.248.84.201
114.248.84.64
114.248.84.79
114.248.85.150
114.248.85.154
114.248.85.159
114.248.85.188
114.248.85.189
114.248.85.197
114.248.85.204
forensicinsight.org
Q & A
n0fate@n0fate.com
forensicinsight.org
References
• Inside an APT Campaign with Multiple Targets in India and Japan : http://www.trendmicro.com/cloud-content/us/
pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf
• The HeartBeat APT Campaign : http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-
papers/wp_the-heartbeat-apt-campaign.pdf
• OSX/Dockster.A and Win32/Trojan.Agent.AXMO samples, pcaps, OSX malware analysis tools : http://
contagiodump.blogspot.kr/2012/12/osxdockstera-and-win32trojanagentaxmo.html
• New Mac Malware found on Dalai Lama Related website : http://www.f-secure.com/weblog/archives/00002466.html
• Kaspersky Lab identifies ‘Red October’ cyber-attack : http://www.neurope.eu/article/kaspersky-lab-identifies-red-
october-cyber-attack
• The “Red October” Campaign - An Advanced Cyber Espionage Network Targeting Diplomatic and Government
Agencies : http://www.securelist.com/en/blog/785/
The_Red_October_Campaign_An_Advanced_Cyber_Espionage_Network_Targeting_Diplomatic_and_Governme
nt_Agencies
•

More Related Content

PDF
(130216) #fitalk potentially malicious ur ls
INSIGHT FORENSIC
 
ODP
Malware analysis - What to learn from your invaders
Tazdrumm3r
 
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
 
PPTX
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
 
PPTX
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
CODE BLUE
 
PPTX
Catching fileless attacks
Balaji Rajasekaran
 
PPTX
Malware analysis
Prakashchand Suthar
 
PPTX
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 
(130216) #fitalk potentially malicious ur ls
INSIGHT FORENSIC
 
Malware analysis - What to learn from your invaders
Tazdrumm3r
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
CODE BLUE
 
Catching fileless attacks
Balaji Rajasekaran
 
Malware analysis
Prakashchand Suthar
 
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 

What's hot (20)

PDF
(130105) #fitalk trends in d forensics (dec, 2012)
INSIGHT FORENSIC
 
PPTX
International collaborative efforts to share threat data in a vetted member c...
CODE BLUE
 
PPT
Malware Analysis Made Simple
Paul Melson
 
PPTX
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
CODE BLUE
 
PDF
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
 
ODP
Malware analysis
xabean
 
PPTX
Bsides detroit 2013 honeypots
Tazdrumm3r
 
PPTX
Basic Malware Analysis
Albert Hui
 
PDF
The day I ruled the world (RootedCON 2020)
Javier Junquera
 
PDF
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
 
PDF
Extending Zeek for ICS Defense
James Dickenson
 
PDF
Assume Compromise
Zach Grace
 
PDF
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
PPTX
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
CODE BLUE
 
PDF
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
CODE BLUE
 
PDF
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
PDF
Dario Durando - IoT: Battle of Bots [rooted2018]
RootedCON
 
PPTX
Introduction to Malware Analysis
Andrew McNicol
 
PDF
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
PDF
Forensics perspective ERFA-møde marts 2017
J Hartig
 
(130105) #fitalk trends in d forensics (dec, 2012)
INSIGHT FORENSIC
 
International collaborative efforts to share threat data in a vetted member c...
CODE BLUE
 
Malware Analysis Made Simple
Paul Melson
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
CODE BLUE
 
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
 
Malware analysis
xabean
 
Bsides detroit 2013 honeypots
Tazdrumm3r
 
Basic Malware Analysis
Albert Hui
 
The day I ruled the world (RootedCON 2020)
Javier Junquera
 
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
 
Extending Zeek for ICS Defense
James Dickenson
 
Assume Compromise
Zach Grace
 
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
CODE BLUE
 
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
CODE BLUE
 
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
Dario Durando - IoT: Battle of Bots [rooted2018]
RootedCON
 
Introduction to Malware Analysis
Andrew McNicol
 
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
Forensics perspective ERFA-møde marts 2017
J Hartig
 
Ad

Viewers also liked (20)

PDF
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
PPTX
Evolving a Cyber Space Doctrine
Michael Ruiz
 
PPTX
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
InsideView
 
PDF
Distribution Training
Zachary Howland
 
PPTX
Equation Group : Advanced Secretive Computer Espionage Group
anupriti
 
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
PPT
Inside Srl - Emilio Luchetta
bnioceanoblu
 
PDF
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
Andrea Maggipinto [+1k]
 
PDF
kyoungju_kwak_the_new_wave_of_cyber_terror
PacSecJP
 
PPTX
VLADIMIR KRYSHEVYCH
slidequintasia
 
PDF
A Reconfiguração do Jornalismo Investigativo e a Influência do Hacktivismo, d...
Ruy De Queiroz
 
PDF
Trojan di stato
Antonio Lepore ✔ ✈
 
PDF
Verizon Data Breach Investigation Report
xband
 
PDF
Attacchi e difese: l'esperienza del CSI Piemonte
CSI Piemonte
 
PDF
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
 
PPTX
Reverse engineering malware
Cysinfo Cyber Security Community
 
PDF
Smau Milano 2016 - Marco Bozzetti, Aipsi
SMAU
 
PDF
Il Ransomware nelle Aziende - Eset Security Days 2016
Gianni Amato
 
PPTX
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
CODE BLUE
 
PDF
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
INSIGHT FORENSIC
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
Evolving a Cyber Space Doctrine
Michael Ruiz
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
InsideView
 
Distribution Training
Zachary Howland
 
Equation Group : Advanced Secretive Computer Espionage Group
anupriti
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
Inside Srl - Emilio Luchetta
bnioceanoblu
 
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
Andrea Maggipinto [+1k]
 
kyoungju_kwak_the_new_wave_of_cyber_terror
PacSecJP
 
VLADIMIR KRYSHEVYCH
slidequintasia
 
A Reconfiguração do Jornalismo Investigativo e a Influência do Hacktivismo, d...
Ruy De Queiroz
 
Trojan di stato
Antonio Lepore ✔ ✈
 
Verizon Data Breach Investigation Report
xband
 
Attacchi e difese: l'esperienza del CSI Piemonte
CSI Piemonte
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
 
Reverse engineering malware
Cysinfo Cyber Security Community
 
Smau Milano 2016 - Marco Bozzetti, Aipsi
SMAU
 
Il Ransomware nelle Aziende - Eset Security Days 2016
Gianni Amato
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
CODE BLUE
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
INSIGHT FORENSIC
 
Ad

Similar to (130119) #fitalk apt, cyber espionage threat (20)

PDF
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
PPTX
Botnets Attacks.pptx
MuhammadRehan856177
 
PDF
Talk28oct14
mjos
 
PDF
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
APNIC
 
PPTX
Phases of penetration testing
Abdul Rahman
 
PPTX
Advanced Persistent Threats
ESET
 
PDF
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Priyanka Aash
 
PDF
3. APTs Presentation
isc2-hellenic
 
PPTX
Python-Assisted Red-Teaming Operation
Satria Ady Pradana
 
PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
grecsl
 
PDF
FireSIGHT Management Center (FMC) slides
Amy Gerrie
 
PPTX
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
PPTX
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 
DOCX
Project Malware AnalysisCS 6262 Project 3Agenda.docx
briancrawford30935
 
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
 
PDF
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
PDF
Honeycon2016-honeypot updates for public
Julia Yu-Chin Cheng
 
PPS
Workshop on BackTrack live CD
amiable_indian
 
PPT
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
Botnets Attacks.pptx
MuhammadRehan856177
 
Talk28oct14
mjos
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
APNIC
 
Phases of penetration testing
Abdul Rahman
 
Advanced Persistent Threats
ESET
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Priyanka Aash
 
3. APTs Presentation
isc2-hellenic
 
Python-Assisted Red-Teaming Operation
Satria Ady Pradana
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
grecsl
 
FireSIGHT Management Center (FMC) slides
Amy Gerrie
 
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
briancrawford30935
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
 
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
Honeycon2016-honeypot updates for public
Julia Yu-Chin Cheng
 
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 

More from INSIGHT FORENSIC (20)

PDF
(160820) #fitalk fileless malware forensics
INSIGHT FORENSIC
 
PDF
(150124) #fitalk advanced $usn jrnl forensics (korean)
INSIGHT FORENSIC
 
PDF
(150124) #fitalk advanced $usn jrnl forensics (english)
INSIGHT FORENSIC
 
PDF
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
INSIGHT FORENSIC
 
PDF
(140118) #fitalk 2013 e-discovery trend
INSIGHT FORENSIC
 
PDF
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
INSIGHT FORENSIC
 
PDF
(141031) #fitalk os x yosemite artifacts
INSIGHT FORENSIC
 
PDF
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
INSIGHT FORENSIC
 
PDF
(140716) #fitalk digital evidence from android-based smartwatch
INSIGHT FORENSIC
 
PDF
(140625) #fitalk sq lite 소개와 구조 분석
INSIGHT FORENSIC
 
PDF
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
INSIGHT FORENSIC
 
PDF
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
INSIGHT FORENSIC
 
PDF
(130216) #fitalk reverse connection tool analysis
INSIGHT FORENSIC
 
PDF
(130202) #fitalk trends in d forensics (jan, 2013)
INSIGHT FORENSIC
 
PDF
(130202) #fitalk china threat
INSIGHT FORENSIC
 
PDF
(130119) #fitalk sql server forensics
INSIGHT FORENSIC
 
PDF
(130119) #fitalk all about physical data recovery
INSIGHT FORENSIC
 
PDF
(130105) #fitalk criminal civil judicial procedure in korea
INSIGHT FORENSIC
 
PDF
(131116) #fitalk extracting user typing history on bash in mac os x memory
INSIGHT FORENSIC
 
PDF
(131102) #fitalk get windows logon password in memory dump
INSIGHT FORENSIC
 
(160820) #fitalk fileless malware forensics
INSIGHT FORENSIC
 
(150124) #fitalk advanced $usn jrnl forensics (korean)
INSIGHT FORENSIC
 
(150124) #fitalk advanced $usn jrnl forensics (english)
INSIGHT FORENSIC
 
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
INSIGHT FORENSIC
 
(140118) #fitalk 2013 e-discovery trend
INSIGHT FORENSIC
 
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
INSIGHT FORENSIC
 
(141031) #fitalk os x yosemite artifacts
INSIGHT FORENSIC
 
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
INSIGHT FORENSIC
 
(140716) #fitalk digital evidence from android-based smartwatch
INSIGHT FORENSIC
 
(140625) #fitalk sq lite 소개와 구조 분석
INSIGHT FORENSIC
 
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
INSIGHT FORENSIC
 
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
INSIGHT FORENSIC
 
(130216) #fitalk reverse connection tool analysis
INSIGHT FORENSIC
 
(130202) #fitalk trends in d forensics (jan, 2013)
INSIGHT FORENSIC
 
(130202) #fitalk china threat
INSIGHT FORENSIC
 
(130119) #fitalk sql server forensics
INSIGHT FORENSIC
 
(130119) #fitalk all about physical data recovery
INSIGHT FORENSIC
 
(130105) #fitalk criminal civil judicial procedure in korea
INSIGHT FORENSIC
 
(131116) #fitalk extracting user typing history on bash in mac os x memory
INSIGHT FORENSIC
 
(131102) #fitalk get windows logon password in memory dump
INSIGHT FORENSIC
 

Recently uploaded (20)

PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Software Development Methodologies in 2025
KodekX
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 

(130119) #fitalk apt, cyber espionage threat