Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Linking attacks to threat actors: case studies

In this talk, Kurt Baumgartner will examine recent APT alerts and discussions, and how to get the jump on how or why this malware is connected with past activity. In particular, we will start with 2020 Kwampirs and Lazarus reporting and present details on these malware techniques. See the talk - https://www.brighttalk.com/webcast/15591/414427/great-ideas-powered-by-sas-malware-attribution-and-next-gen-iot-honeypots?utm_source=twitter&utm_medium=social&utm_campaign=gl_Espo_je0066&utm_content=link&utm_term=gl_twitter_organic_vhodkkt66zpvmhb

  • Be the first to comment

Linking attacks to threat actors: case studies

  1. 1. • • • •
  2. 2. Darkhotel - part 2 MsnMM Campaigns Satellite Turla Wild Neutron Blue Termite Spring Dragon 2011 2010 2013 Stuxnet Duqu 2012 Gauss Flame Mini Flame NetTraveler Miniduke RedOctober Icefog Winnti Kimsuky TeamSpy 2014 Epic Turla CosmicDuke Regin Careto / The Mask Energetic Bear / Crouching Yeti Darkhotel 2015 Desert Falcons Hellsing Sofacy Carbanak Equation Naikon Animal Farm Duqu 2.0 ProjectSauron Saguaro StrongPity Ghoul Fruity Armor ScarCruft 2016 Poseidon Lazarus Lurk GCMan Danti Adwind Dropping Elephant Metel Shamoon 2.0 WannaCry Moonlight Maze WhiteBear Silence 2017 ShadowPad BlueNoroff ExPetr/NotPetya ATMitch BlackOasis StoneDrill
  3. 3. • • • • •
  4. 4. • • • • •
  5. 5. • • •
  6. 6. • • •
  7. 7. • • • • •
  8. 8. • • • • • •

×