SlideShare a Scribd company logo
Burrowing Through The Network:
Contextualizing The Vulkan Leaks
& State-Sponsored Offensive
Operations
Joe Slowik, Paralus LLC
Quick Background
● Current:
○ CTI & ICS/OT Consulting @ Paralus LLC
○ Threat Intelligence Management @ Huntress
● Previous:
○ Threat Intelligence & Detection Engineering Lead @ Gigamon
○ Threat Research @ DomainTools & Dragos
○ Incident Response Lead @ Los Alamos National Laboratory
○ “Various” @ US Navy
Agenda
● The Vulkan Files
● Vulkan & Russian Cyber Operations
● Orienting Vulkan Capabilities In Cyber History
● Future Of Offensive Cyber Operations
● Conclusions
The Vulkan Files
What Are The Vulkan Files?
What Are The Vulkan Files?
What Are The Vulkan Files?
What Are The Vulkan Files?
What Are The Vulkan Files?
Computer Technology Firm, Founded In 2010 By Russian Military
Veterans With Approval To Perform Classified Work.
NTC Vulkan
What Are The Vulkan Files?
Computer Technology Firm, Founded In 2010 By Russian Military
Veterans With Approval To Perform Classified Work.
NTC Vulkan
Unknown Entity Leaked Project Information And Documentation For
Various Projects To German Journalists
The Leaks
What Are The Vulkan Files?
Computer Technology Firm, Founded In 2010 By Russian Military
Veterans With Approval To Perform Classified Work.
NTC Vulkan
Unknown Entity Leaked Project Information And Documentation For
Various Projects To German Journalists
The Leaks
Rarely Do We See The “Nuts & Bolts” Of CNO Tool Development &
Procurement Processes - Lots Of Data To Go Through!
The
Significance
NTC Vulkan
Programs Of Interest
Programs Of Interest
Scan-V
Programs Of Interest
Scan-V
Amesit
Programs Of Interest
Scan-V
Amesit
Krystal-2V
Scan-V
Scan-V
Scan-V
Scan-V
Design
Scan-V
Design
● Distributed, Multi-Component System Crossing Various Information Boundaries
● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities
Scan-V
Design
● Distributed, Multi-Component System Crossing Various Information Boundaries
● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities
Purpose
Scan-V
Design
● Distributed, Multi-Component System Crossing Various Information Boundaries
● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities
Purpose
● Combine External Scanning Functionality With Catalog Of Vulnerabilities & Exploits
● Automate Or Increase The Efficiency Of Cyber Operations, Infrastructure Harvesting
Amesit
Amesit
Information Operations & Collection Platform
Amesit
Information Operations & Collection Platform
Capable Of Capturing & Proxying Communication
Streams For Collection & Manipulation
Amesit
Information Operations & Collection Platform
Capable Of Capturing & Proxying Communication
Streams For Collection & Manipulation
Potential Applications In Both Foreign & Domestic
Targeting
Response To The Vulkan Leaks
Response To The Vulkan Leaks
Response To The Vulkan Leaks
Response To The Vulkan Leaks
Response To The Vulkan Leaks
Response To The Vulkan Leaks
Diving Into The Vulkan Leaks
The Vulkan Leaks Represent A
Significant Event In The History Of
Cyber Operations - We Need To Review
Just What’s Inside!
Vulkan & Russian Cyber Operations
Diving Into The Vulkan Leaks
NTC
Vulkan
Diving Into The Vulkan Leaks
NTC
Vulkan
Scan-V
Amesit
Krystal-2V
MiniDuke
Diving Into The Vulkan Leaks
NTC
Vulkan
Scan-V
Amesit
Krystal-2V
MiniDuke
GRU
74455
FSB Radio
Research
Institute
SVR
Vulkan & Russia’s “Cyber Hydra”
For Various Reasons, Research
Institutes & External Entities Generally
Perform Dedicated Work For One
Element Of Russia’s Cyber Forces…
Vulkan & Russia’s “Cyber Hydra”
For Various Reasons, Research
Institutes & External Entities Generally
Perform Dedicated Work For One
Element Of Russia’s Cyber Forces…
NTC Vulkan Worked With EACH Element
Of Russian External Cyber Ops - GRU,
FSB, & SVR - Not Completely Unique
But Rare!
RU Cyber & The Private Sector
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
SVA Institute &
SVR
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
ODT & FSB’s
Fronton Botnet
SVA Institute &
SVR
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
ODT & FSB’s
Fronton Botnet
Kvant Institute &
FSB
SVA Institute &
SVR
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
ODT & FSB’s
Fronton Botnet
Kvant Institute &
FSB
SVA Institute &
SVR
INCONTROLLER /
PIPEDREAM?
RU Cyber & The Private Sector
TsNIIKhM &
XENOTIME
ODT & FSB’s
Fronton Botnet
Kvant Institute &
FSB
SVA Institute &
SVR
INCONTROLLER /
PIPEDREAM?
Privatization Of Cyber Development
NTC Vulkan Is Both An Example And A
Pioneer Of Increasingly Outsourced
Cyber Development & Engineering Work
For State-Directed Operations!
Privatization Of Cyber Development
NTC Vulkan Is Both An Example And A
Pioneer Of Increasingly Outsourced
Cyber Development & Engineering Work
For State-Directed Operations!
NOTE: This Is
NOT Just
Russia!
Scan-V & Sandworm
Scan-V & Sandworm
Sandworm
Historically
Leverages
Compromised,
Legitimate
Infrastructure
Scan-V & Sandworm
Sandworm
Historically
Leverages
Compromised,
Legitimate
Infrastructure
Multiple
Examples -
Ranging From
Industroyer To
CyclopsBlink
Scan-V & Sandworm
Sandworm
Historically
Leverages
Compromised,
Legitimate
Infrastructure
Multiple
Examples -
Ranging From
Industroyer To
CyclopsBlink
Building Out
C2
Infrastructure
Scales More
Effectively
With
Automation!
Scan-V & Sandworm
Scan-V & Sandworm
Stockpile
Vulnerabilities
Scan-V & Sandworm
Stockpile
Vulnerabilities
Identify Vulnerable
Nodes
Scan-V & Sandworm
Stockpile
Vulnerabilities
Identify Vulnerable
Nodes
Victims Become Part
Of Proxy Chains
Scan-V & Sandworm
Scan-V & Sandworm
Yo, Check
Out My
ORB!
The “So What” Behind Vulkan
The “So What” Behind Vulkan
Focus On Scalability & Control Of Widespread
Operations
The “So What” Behind Vulkan
Focus On Scalability & Control Of Widespread
Operations
Enables Greater Efficiency & Increases Extent Of
Cyber Activity
The “So What” Behind Vulkan
Focus On Scalability & Control Of Widespread
Operations
Enables Greater Efficiency & Increases Extent Of
Cyber Activity
Transition From “One Operator, One Op” To Massive,
Distributed Campaigns
Vulkan In Cyber History
Is Vulkan Activity Unique?
Is Vulkan Activity Unique?
Scan-V - Similar Examples?
Scan-V - Similar Examples?
Russia!
Scan-V - Similar Examples?
Russia! China!
Scan-V - Similar Examples?
Russia! China!
USA?
Scan-V - Similar Examples?
Russia & Cyber Manipulation
Russia & Cyber Manipulation
Building
Compromised
Networks
Monitoring &
Manipulating
Information
Russia & Cyber Manipulation
Building
Compromised
Networks
Monitoring &
Manipulating
Information
VPNFilter
CyclopsBlink
SORM
VPNFilter & CyclopsBlink
VPNFilter & CyclopsBlink
Network-Device Targeting Capabilities
VPNFilter & CyclopsBlink
Network-Device Targeting Capabilities
Leverage Compromised Nodes To Proxy Traffic, Or
Engage In DDoS Activity
VPNFilter & CyclopsBlink
Network-Device Targeting Capabilities
Leverage Compromised Nodes To Proxy Traffic, Or
Engage In DDoS Activity
Evidence Of Further Capabilities (e.g., VPNFilter
Modbus Capture Module)
VPNFilter & CyclopsBlink
Scan-V Represents A Mechanism To
Automate, Control, & Manage A Network
Of Collection Nodes & ORBs For Cyber
Operations - Scalability & Efficiency!
SORM
SORM
SORM To Amesit
Amesit Enables A Mobile, Flexible
Deployment Of SORM-Like Capabilities,
Including For INFORMATION &
INFLUENCE OPERATION PURPOSES.
Can Also Be “Forward Deployed.”
What About PRC?
What About PRC?
What About PRC?
What About PRC?
PRC CNO & IO Operations
PRC CNO & IO Operations
Great Cannon
Is Nearly 10
Years Old Now
- Disclosed In
2015!
PRC CNO & IO Operations
Great Cannon
Is Nearly 10
Years Old Now
- Disclosed In
2015!
PRC (Likely)
Continues To
Invest &
Innovate In
Cyber
Operations
PRC CNO & IO Operations
Great Cannon
Is Nearly 10
Years Old Now
- Disclosed In
2015!
PRC (Likely)
Continues To
Invest &
Innovate In
Cyber
Operations
Widespread
Intrusion Ops -
Exchange,
Barracuda
ESGs,
Emphasize
This!
PRC CNO & IO Operations
Great Firewall & Great Cannon
Functionality Give Glimpses Of Similar
Ambitions & Programs - Main Question
Is Scalability & Management Of These
Capabilities & Widespread Intrusion
Campaigns
The United States & FVEY
Hey - Remember The
Snowden Leaks?
The United States & FVEY
Hey - Remember The
Snowden Leaks?
NOTE THAT THE FOLLOWING SLIDES
ARE BASED ON PUBLIC COMMENTARY
AND POSTING HERE NEITHER
CONFIRMS NOR DENIES THE ACCURACY
OR VERACITY OF THESE ITEMS!
NSA Leaks & Implications
NSA Leaks & Implications
Popular Conception
NSA Leaks & Implications
Popular Conception
● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies
● Clearly Important - But Hardly The Limit Of What Was Disclosed
NSA Leaks & Implications
Popular Conception
● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies
● Clearly Important - But Hardly The Limit Of What Was Disclosed
Additional Details
NSA Leaks & Implications
Popular Conception
● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies
● Clearly Important - But Hardly The Limit Of What Was Disclosed
Additional Details
● Snowden (And Potentially Others) Disclosed SIGNIFICANT Information On CNO
Capabilities & Tradecraft Beyond Privacy & Legality Issues!
● Less-Heralded But Arguably More Significant Were Widespread, Automated
Exploitation & Control Frameworks
A Quantum Of Exploitation
A Quantum Of Exploitation
A Quantum Of Exploitation
Automated Exploitation At Scale
Automated Exploitation At Scale
QUANTUM, TURBINE, Etc.
Represent Automated
Exploit Systems
Automated Exploitation At Scale
QUANTUM, TURBINE, Etc.
Represent Automated
Exploit Systems
Disclosed Publicly In Early
2010’s - Possibility
Adversaries Identified Earlier
Automated Exploitation At Scale
QUANTUM, TURBINE, Etc.
Represent Automated
Exploit Systems
Disclosed Publicly In Early
2010’s - Possibility
Adversaries Identified Earlier
Alleged FVEY “State Of
The Art” In 2010 Now
Reflected In RU, PRC Ops
Snowden, Vulkan, & Beyond
IF TRUE - Snowden Leaks Were
Arguably A DISASTER For US, Related
CNO & SIGINT Capabilities By
Disclosing Methodology…
Snowden, Vulkan, & Beyond
IF TRUE - Snowden Leaks Were
Arguably A DISASTER For US, Related
CNO & SIGINT Capabilities By
Disclosing Methodology…
…It Also Appears That Multiple Parties
Were Taking Notes On How To Build
Similar (Or More Ambitious) Programs
Based On Disclosures!
The Future Of Offensive Cyber
Popular Conception Of CNO
Realistic Depiction Of CNO
Future Applications Of CNO
The Road To Scalable Cyber
The Road To Scalable Cyber
Cyber Talent Is Expensive - Codifying Capabilities In Technology &
Programs Is Key To Expansive & Efficient Action!
Personnel
The Road To Scalable Cyber
Cyber Talent Is Expensive - Codifying Capabilities In Technology &
Programs Is Key To Expansive & Efficient Action!
Personnel
Global Ambitions Require Global Actions. Assumptions On Targeting &
Focus Go Out The Window - Especially When Targets Can Be “Means
To An End!”
Targeting
The Road To Scalable Cyber
Cyber Talent Is Expensive - Codifying Capabilities In Technology &
Programs Is Key To Expansive & Efficient Action!
Personnel
Global Ambitions Require Global Actions. Assumptions On Targeting &
Focus Go Out The Window - Especially When Targets Can Be “Means
To An End!”
Targeting
Top-Tier Threat Actors Know How Defenders & CTI Analysts Operate -
They Will Work To Evade Known Analytical Tradecraft & Minimize
Touchpoints Wherever Possible!
Operational
Security
NTC Vulkan & CNO
Vulkan Capabilities Are LAGGING
Indicators - This Activity Has Already
Taken Place!
NTC Vulkan & CNO
Vulkan Capabilities Are LAGGING
Indicators - This Activity Has Already
Taken Place!
We Need To Anticipate Greater Degrees
Of Automation, Queueing, & Reactive
Targeting!
What Should We Expect?
What Should We Expect?
Greater
Automation &
Improved
Scalability
What Should We Expect?
Greater
Automation &
Improved
Scalability
Leverage
“Neutral Web”
For Offensive
Action
What Should We Expect?
Greater
Automation &
Improved
Scalability
Reduced
Reliance On
“Rockstars” -
Commoditization
Leverage
“Neutral Web”
For Offensive
Action
What Should We Expect?
Greater
Automation &
Improved
Scalability
Reduced
Reliance On
“Rockstars” -
Commoditization
Leverage
“Neutral Web”
For Offensive
Action
Actual,
Meaningful
Applications Of
ML/AI
Conclusions
Where Are We Now?
Where Are We Now?
But…
Capability Inspiration & Proliferation
Capability Inspiration & Proliferation
Adversaries Learn From “Other Adversary”
Operations & Open Source Research
Capability Inspiration & Proliferation
Adversaries Learn From “Other Adversary”
Operations & Open Source Research
Today’s Leak Or Disclosure Is Inspiration For
Tomorrow’s Capability & Evolution
Capability Inspiration & Proliferation
Adversaries Learn From “Other Adversary”
Operations & Open Source Research
Today’s Leak Or Disclosure Is Inspiration For
Tomorrow’s Capability & Evolution
CNO Is NOT A Static Field - But A Constantly
Evolving One With Multiple Factors
Guidance For Defenders
Guidance For Defenders
Adversaries
Are
CONSTANTLY
Growing &
Evolving
Guidance For Defenders
Adversaries
Are
CONSTANTLY
Growing &
Evolving
Legacy
Techniques &
Tradecraft For
Defense &
Identification
WILL FAIL
Guidance For Defenders
Adversaries
Are
CONSTANTLY
Growing &
Evolving
Legacy
Techniques &
Tradecraft For
Defense &
Identification
WILL FAIL
Emphasis On
Behavioral
Analysis &
Anomaly
Detection,
Enrichment
Required!
Guidance For Defenders
If Adversaries Are Moving
Towards Greater
Automation &
Efficiencies, Defenders
Will Be LOST If We Do
Not Do The Same!
Advice For Offense
Advice For Offense
Human-Drive Operations Are
Rapidly Being Replaced In Ops
Advice For Offense
Human-Drive Operations Are
Rapidly Being Replaced In Ops
Adversary Emulation &
Success Requires
Understanding Trends
Advice For Offense
Human-Drive Operations Are
Rapidly Being Replaced In Ops
Adversary Emulation &
Success Requires
Understanding Trends
Testing & Probing Will Become
More Technically Challenging!
Where Do We Go From Here?
Networks Of Various Types Will
Continue To Be Weaponized By Diverse
Parties, Either As End-Targets Or Means
To Reaching Them…
Where Do We Go From Here?
Networks Of Various Types Will
Continue To Be Weaponized By Diverse
Parties, Either As End-Targets Or Means
To Reaching Them…
…The Increasing Scale & Velocity Of
Campaigns Will Make Defense &
Response Challenging - But Not
Impossible!
Questions?
Selected Works Cited
● The Vulkan Files - Papertrail Media (https://www.papertrailmedia.de/investigations/vulkan-files/)
● Vulkan Files - Der Spiegel (https://www.spiegel.de/thema/vulkanfiles/)
● “Secret Trove Offers Rare Look Into Russian Cyberwar Ambitions” - Craig Timberg, Ellen Nakashima, Hannes Munzinger, & Hakan Tanriverdi, The
Washington Post (https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/)
● “‘Vulkan Files’ Leak Reveals Putin’s Global And Domestic Cyberwarfare Tactics” - Luke Harding, Stiliyana Simeonova, Manisha Ganguly, & Dan Sabbagh,
The Guardian (https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics)
● “Contracts Identify Cyber Operations Projects From Russian Company NTC Vulkan” - Alden Wahlstrom, Gabby Roncone, Keith Lunden, & Daniel
Kapellmann Zafra, Mandiant (https://www.mandiant.com/resources/blog/cyber-operations-russian-vulkan)
● “Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure” - Kevin Woolf & Bryce Livingston, Dragos
(https://hub.dragos.com/hubfs/Dragos_IntelBrief_Russian-Programs-Threatening-Critical_Infrastructure.pdf)
● “Zeroing In On XENOTIME” - Joe Slowik, VirusBulletin
(https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Zeroing-in-on-XENOTIME-analysis-of-the-entities-responsible-for-the-Tri
ton-event.pdf)
● CyberWatchers Twitter Thread (https://threadreaderapp.com/thread/1615358254409986053.html)
● “New VPNFilter Malware Targets At Least 500k Networking Devices Worldwide” - William Largent, Cisco Talos
(https://blog.talosintelligence.com/vpnfilter/)
● “New Sandworm Malware Cyclops Blink Replaces VPNFilter” - US CISA (https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-054a)
● “The Great Firewall Of China: Xi Jinping’s Internet Shutdown” - Elizabeth C. Economy, The Guardian
(https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown)
● “China’s Great Cannon” - Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, &
Vern Paxson, The Citizen Lab (https://citizenlab.ca/2015/04/chinas-great-cannon/)
● “A Close Look At The NSA’s Most Powerful Internet Attack Tool” - Nicolas Weaver, Wired (https://www.wired.com/2014/03/quantum/)
● “NSA’s Automated Hacking Engine Offers Hands-Free Pwning Of The World” - Sean Gallagher, Ars Technica
(https://arstechnica.com/information-technology/2014/03/nsas-automated-hacking-engine-offers-hands-free-pwning-of-the-world/)
● “Hack Like The NSA: The Quantum Insert” - otw, HackersArise (https://www.hackers-arise.com/post/2016/09/09/hack-like-the-nsa-the-quantum-insert)
Contact Info:
● joe@paralus.co
● @jfslowik - X/Mastodon/Bsky
● Signal (Talk To Me First!)

More Related Content

What's hot

はじめての Gatling
はじめての Gatlingはじめての Gatling
はじめての Gatling
Naoya Nakazawa
 
The boolean operation for Cubic Bezier
The boolean operation for Cubic BezierThe boolean operation for Cubic Bezier
The boolean operation for Cubic Bezier
mikanplus
 
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
Game Tools & Middleware Forum
 
静的解析ツールKlocwork によるCERT-C/CWE対応
静的解析ツールKlocwork によるCERT-C/CWE対応静的解析ツールKlocwork によるCERT-C/CWE対応
静的解析ツールKlocwork によるCERT-C/CWE対応
Masaru Horioka
 
Amazon RDS for OracleでのAPEX環境作成
Amazon RDS for OracleでのAPEX環境作成Amazon RDS for OracleでのAPEX環境作成
Amazon RDS for OracleでのAPEX環境作成
Nakakoshi Yuji
 
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
Shota Tsuge
 
OCIコンテナサービス関連の技術詳細
OCIコンテナサービス関連の技術詳細OCIコンテナサービス関連の技術詳細
OCIコンテナサービス関連の技術詳細
オラクルエンジニア通信
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk
 
Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
Windows Server 2019 の Hyper-Converged Infrastructure (HCI) Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
Hiroshi Matsumoto
 
脆弱性検査ツールってどうよ
脆弱性検査ツールってどうよ脆弱性検査ツールってどうよ
脆弱性検査ツールってどうよ
Masakazu Ikeda
 
Demo of ISO 37001:2016 documentation kit
Demo of ISO 37001:2016 documentation kitDemo of ISO 37001:2016 documentation kit
Demo of ISO 37001:2016 documentation kit
Global Manager Group
 
Azure Arc 概要
Azure Arc 概要Azure Arc 概要
Azure Arc 概要
Kazuki Takai
 
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit GuardIT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
TAKUYA OHTA
 
Dep005 azure ネットワーク設計
Dep005 azure ネットワーク設計Dep005 azure ネットワーク設計
Dep005 azure ネットワーク設計
Tech Summit 2016
 
とある診断員とSQLインジェクション
とある診断員とSQLインジェクションとある診断員とSQLインジェクション
とある診断員とSQLインジェクション
zaki4649
 
放送を取り巻く最新動画配信技術
放送を取り巻く最新動画配信技術放送を取り巻く最新動画配信技術
放送を取り巻く最新動画配信技術
Masashi Ito
 
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか? [SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
de:code 2017
 
ネットワークOS野郎 ~ インフラ野郎Night 20160414
ネットワークOS野郎 ~ インフラ野郎Night 20160414ネットワークOS野郎 ~ インフラ野郎Night 20160414
ネットワークOS野郎 ~ インフラ野郎Night 20160414
Kentaro Ebisawa
 
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
Kentaro Ishizuka
 
Azure Blueprints - 企業で期待される背景と特徴、活用方法
Azure Blueprints - 企業で期待される背景と特徴、活用方法Azure Blueprints - 企業で期待される背景と特徴、活用方法
Azure Blueprints - 企業で期待される背景と特徴、活用方法
Toru Makabe
 

What's hot (20)

はじめての Gatling
はじめての Gatlingはじめての Gatling
はじめての Gatling
 
The boolean operation for Cubic Bezier
The boolean operation for Cubic BezierThe boolean operation for Cubic Bezier
The boolean operation for Cubic Bezier
 
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
GTMF 2015: バグを減らそう。テストを楽にしよう。静的解析が開発者を救う。 | 日本シノプシス合同会社
 
静的解析ツールKlocwork によるCERT-C/CWE対応
静的解析ツールKlocwork によるCERT-C/CWE対応静的解析ツールKlocwork によるCERT-C/CWE対応
静的解析ツールKlocwork によるCERT-C/CWE対応
 
Amazon RDS for OracleでのAPEX環境作成
Amazon RDS for OracleでのAPEX環境作成Amazon RDS for OracleでのAPEX環境作成
Amazon RDS for OracleでのAPEX環境作成
 
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
Well-Architectedな組織を
実現するためのチャレンジ - なぜ、CA W-Aを作ろうと思ったのか - #jawsdays 2019
 
OCIコンテナサービス関連の技術詳細
OCIコンテナサービス関連の技術詳細OCIコンテナサービス関連の技術詳細
OCIコンテナサービス関連の技術詳細
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
 
Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
Windows Server 2019 の Hyper-Converged Infrastructure (HCI) Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
Windows Server 2019 の Hyper-Converged Infrastructure (HCI)
 
脆弱性検査ツールってどうよ
脆弱性検査ツールってどうよ脆弱性検査ツールってどうよ
脆弱性検査ツールってどうよ
 
Demo of ISO 37001:2016 documentation kit
Demo of ISO 37001:2016 documentation kitDemo of ISO 37001:2016 documentation kit
Demo of ISO 37001:2016 documentation kit
 
Azure Arc 概要
Azure Arc 概要Azure Arc 概要
Azure Arc 概要
 
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit GuardIT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
IT エンジニアのための 流し読み Windows - Microsoft Defender Exploit Guard
 
Dep005 azure ネットワーク設計
Dep005 azure ネットワーク設計Dep005 azure ネットワーク設計
Dep005 azure ネットワーク設計
 
とある診断員とSQLインジェクション
とある診断員とSQLインジェクションとある診断員とSQLインジェクション
とある診断員とSQLインジェクション
 
放送を取り巻く最新動画配信技術
放送を取り巻く最新動画配信技術放送を取り巻く最新動画配信技術
放送を取り巻く最新動画配信技術
 
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか? [SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
[SC03] Active Directory の DR 対策~天災/人災/サイバー攻撃、その時あなたの IT 基盤は利用継続できますか?
 
ネットワークOS野郎 ~ インフラ野郎Night 20160414
ネットワークOS野郎 ~ インフラ野郎Night 20160414ネットワークOS野郎 ~ インフラ野郎Night 20160414
ネットワークOS野郎 ~ インフラ野郎Night 20160414
 
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
How to write Ansible modules for A10 Thunder - A10 Networks' presentation at ...
 
Azure Blueprints - 企業で期待される背景と特徴、活用方法
Azure Blueprints - 企業で期待される背景と特徴、活用方法Azure Blueprints - 企業で期待される背景と特徴、活用方法
Azure Blueprints - 企業で期待される背景と特徴、活用方法
 

Similar to Burrowing Through The Network - Contextualizing The Vulkan Leaks

China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINAL
China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINALChina SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINAL
China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINALRick Bauer
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
Joe Slowik
 
Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...
Dee Magnoni
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
Dinis Cruz
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Lancope, Inc.
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиPositive Hack Days
 
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Burr Sutter
 
CloudStack and NFV
CloudStack and NFVCloudStack and NFV
CloudStack and NFV
ShapeBlue
 
Reactive Streams, j.u.concurrent & Beyond!
Reactive Streams, j.u.concurrent & Beyond!Reactive Streams, j.u.concurrent & Beyond!
Reactive Streams, j.u.concurrent & Beyond!
Konrad Malawski
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide Scanning
Jamie O'Hare
 
Exploring the Future of Science and Technology
Exploring the Future of Science and TechnologyExploring the Future of Science and Technology
Exploring the Future of Science and Technology
Paul Schumann
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
Marina Krotofil
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
AFCEA International
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
APNIC
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
Saumil Shah
 
CCNA17 CloudStack and NFV
CCNA17 CloudStack and NFVCCNA17 CloudStack and NFV
CCNA17 CloudStack and NFV
ShapeBlue
 
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & DriftctlFOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
Stephane Jourdan
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
Derek King
 
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...Amazon Web Services
 

Similar to Burrowing Through The Network - Contextualizing The Vulkan Leaks (20)

China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINAL
China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINALChina SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINAL
China SDN NFV Industry Alliance_ONF_Rick Bauer_To Act and Not Lay Claim FINAL
 
Brian Wernham and agile project management
Brian Wernham and agile project managementBrian Wernham and agile project management
Brian Wernham and agile project management
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
 
Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
 
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
 
CloudStack and NFV
CloudStack and NFVCloudStack and NFV
CloudStack and NFV
 
Reactive Streams, j.u.concurrent & Beyond!
Reactive Streams, j.u.concurrent & Beyond!Reactive Streams, j.u.concurrent & Beyond!
Reactive Streams, j.u.concurrent & Beyond!
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide Scanning
 
Exploring the Future of Science and Technology
Exploring the Future of Science and TechnologyExploring the Future of Science and Technology
Exploring the Future of Science and Technology
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
 
CCNA17 CloudStack and NFV
CCNA17 CloudStack and NFVCCNA17 CloudStack and NFV
CCNA17 CloudStack and NFV
 
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & DriftctlFOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
AWS Cloud Kata 2013 | Singapore - Opening Keynote: Running Lean & Scaling Fas...
 

More from Joe Slowik

Understanding Indicators
Understanding IndicatorsUnderstanding Indicators
Understanding Indicators
Joe Slowik
 
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Joe Slowik
 
Cyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope securityCyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope security
Joe Slowik
 
Mission kill process targeting in ics attacks
Mission kill process targeting in ics attacksMission kill process targeting in ics attacks
Mission kill process targeting in ics attacks
Joe Slowik
 
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksFull-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Joe Slowik
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
Joe Slowik
 
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik
 
EASE spectre meltdown_support
EASE spectre meltdown_supportEASE spectre meltdown_support
EASE spectre meltdown_support
Joe Slowik
 
SANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMISANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMI
Joe Slowik
 

More from Joe Slowik (9)

Understanding Indicators
Understanding IndicatorsUnderstanding Indicators
Understanding Indicators
 
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
 
Cyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope securityCyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope security
 
Mission kill process targeting in ics attacks
Mission kill process targeting in ics attacksMission kill process targeting in ics attacks
Mission kill process targeting in ics attacks
 
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksFull-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure Attacks
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
 
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
 
EASE spectre meltdown_support
EASE spectre meltdown_supportEASE spectre meltdown_support
EASE spectre meltdown_support
 
SANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMISANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMI
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Burrowing Through The Network - Contextualizing The Vulkan Leaks

  • 1. Burrowing Through The Network: Contextualizing The Vulkan Leaks & State-Sponsored Offensive Operations Joe Slowik, Paralus LLC
  • 2. Quick Background ● Current: ○ CTI & ICS/OT Consulting @ Paralus LLC ○ Threat Intelligence Management @ Huntress ● Previous: ○ Threat Intelligence & Detection Engineering Lead @ Gigamon ○ Threat Research @ DomainTools & Dragos ○ Incident Response Lead @ Los Alamos National Laboratory ○ “Various” @ US Navy
  • 3. Agenda ● The Vulkan Files ● Vulkan & Russian Cyber Operations ● Orienting Vulkan Capabilities In Cyber History ● Future Of Offensive Cyber Operations ● Conclusions
  • 5. What Are The Vulkan Files?
  • 6. What Are The Vulkan Files?
  • 7. What Are The Vulkan Files?
  • 8. What Are The Vulkan Files?
  • 9. What Are The Vulkan Files? Computer Technology Firm, Founded In 2010 By Russian Military Veterans With Approval To Perform Classified Work. NTC Vulkan
  • 10. What Are The Vulkan Files? Computer Technology Firm, Founded In 2010 By Russian Military Veterans With Approval To Perform Classified Work. NTC Vulkan Unknown Entity Leaked Project Information And Documentation For Various Projects To German Journalists The Leaks
  • 11. What Are The Vulkan Files? Computer Technology Firm, Founded In 2010 By Russian Military Veterans With Approval To Perform Classified Work. NTC Vulkan Unknown Entity Leaked Project Information And Documentation For Various Projects To German Journalists The Leaks Rarely Do We See The “Nuts & Bolts” Of CNO Tool Development & Procurement Processes - Lots Of Data To Go Through! The Significance
  • 21. Scan-V Design ● Distributed, Multi-Component System Crossing Various Information Boundaries ● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities
  • 22. Scan-V Design ● Distributed, Multi-Component System Crossing Various Information Boundaries ● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities Purpose
  • 23. Scan-V Design ● Distributed, Multi-Component System Crossing Various Information Boundaries ● Designed For Automated Tasking & Action Within Pre-Programmed Capabilities Purpose ● Combine External Scanning Functionality With Catalog Of Vulnerabilities & Exploits ● Automate Or Increase The Efficiency Of Cyber Operations, Infrastructure Harvesting
  • 25. Amesit Information Operations & Collection Platform
  • 26. Amesit Information Operations & Collection Platform Capable Of Capturing & Proxying Communication Streams For Collection & Manipulation
  • 27. Amesit Information Operations & Collection Platform Capable Of Capturing & Proxying Communication Streams For Collection & Manipulation Potential Applications In Both Foreign & Domestic Targeting
  • 28. Response To The Vulkan Leaks
  • 29. Response To The Vulkan Leaks
  • 30. Response To The Vulkan Leaks
  • 31. Response To The Vulkan Leaks
  • 32. Response To The Vulkan Leaks
  • 33. Response To The Vulkan Leaks
  • 34. Diving Into The Vulkan Leaks The Vulkan Leaks Represent A Significant Event In The History Of Cyber Operations - We Need To Review Just What’s Inside!
  • 35. Vulkan & Russian Cyber Operations
  • 36. Diving Into The Vulkan Leaks NTC Vulkan
  • 37. Diving Into The Vulkan Leaks NTC Vulkan Scan-V Amesit Krystal-2V MiniDuke
  • 38. Diving Into The Vulkan Leaks NTC Vulkan Scan-V Amesit Krystal-2V MiniDuke GRU 74455 FSB Radio Research Institute SVR
  • 39. Vulkan & Russia’s “Cyber Hydra” For Various Reasons, Research Institutes & External Entities Generally Perform Dedicated Work For One Element Of Russia’s Cyber Forces…
  • 40. Vulkan & Russia’s “Cyber Hydra” For Various Reasons, Research Institutes & External Entities Generally Perform Dedicated Work For One Element Of Russia’s Cyber Forces… NTC Vulkan Worked With EACH Element Of Russian External Cyber Ops - GRU, FSB, & SVR - Not Completely Unique But Rare!
  • 41. RU Cyber & The Private Sector
  • 42. RU Cyber & The Private Sector TsNIIKhM & XENOTIME
  • 43. RU Cyber & The Private Sector TsNIIKhM & XENOTIME SVA Institute & SVR
  • 44. RU Cyber & The Private Sector TsNIIKhM & XENOTIME ODT & FSB’s Fronton Botnet SVA Institute & SVR
  • 45. RU Cyber & The Private Sector TsNIIKhM & XENOTIME ODT & FSB’s Fronton Botnet Kvant Institute & FSB SVA Institute & SVR
  • 46. RU Cyber & The Private Sector TsNIIKhM & XENOTIME ODT & FSB’s Fronton Botnet Kvant Institute & FSB SVA Institute & SVR INCONTROLLER / PIPEDREAM?
  • 47. RU Cyber & The Private Sector TsNIIKhM & XENOTIME ODT & FSB’s Fronton Botnet Kvant Institute & FSB SVA Institute & SVR INCONTROLLER / PIPEDREAM?
  • 48. Privatization Of Cyber Development NTC Vulkan Is Both An Example And A Pioneer Of Increasingly Outsourced Cyber Development & Engineering Work For State-Directed Operations!
  • 49. Privatization Of Cyber Development NTC Vulkan Is Both An Example And A Pioneer Of Increasingly Outsourced Cyber Development & Engineering Work For State-Directed Operations! NOTE: This Is NOT Just Russia!
  • 53. Scan-V & Sandworm Sandworm Historically Leverages Compromised, Legitimate Infrastructure Multiple Examples - Ranging From Industroyer To CyclopsBlink Building Out C2 Infrastructure Scales More Effectively With Automation!
  • 57. Scan-V & Sandworm Stockpile Vulnerabilities Identify Vulnerable Nodes Victims Become Part Of Proxy Chains
  • 59. Scan-V & Sandworm Yo, Check Out My ORB!
  • 60. The “So What” Behind Vulkan
  • 61. The “So What” Behind Vulkan Focus On Scalability & Control Of Widespread Operations
  • 62. The “So What” Behind Vulkan Focus On Scalability & Control Of Widespread Operations Enables Greater Efficiency & Increases Extent Of Cyber Activity
  • 63. The “So What” Behind Vulkan Focus On Scalability & Control Of Widespread Operations Enables Greater Efficiency & Increases Extent Of Cyber Activity Transition From “One Operator, One Op” To Massive, Distributed Campaigns
  • 64. Vulkan In Cyber History
  • 67. Scan-V - Similar Examples?
  • 68. Scan-V - Similar Examples? Russia!
  • 69. Scan-V - Similar Examples? Russia! China!
  • 70. Scan-V - Similar Examples? Russia! China! USA?
  • 71. Scan-V - Similar Examples?
  • 72. Russia & Cyber Manipulation
  • 73. Russia & Cyber Manipulation Building Compromised Networks Monitoring & Manipulating Information
  • 74. Russia & Cyber Manipulation Building Compromised Networks Monitoring & Manipulating Information VPNFilter CyclopsBlink SORM
  • 76. VPNFilter & CyclopsBlink Network-Device Targeting Capabilities
  • 77. VPNFilter & CyclopsBlink Network-Device Targeting Capabilities Leverage Compromised Nodes To Proxy Traffic, Or Engage In DDoS Activity
  • 78. VPNFilter & CyclopsBlink Network-Device Targeting Capabilities Leverage Compromised Nodes To Proxy Traffic, Or Engage In DDoS Activity Evidence Of Further Capabilities (e.g., VPNFilter Modbus Capture Module)
  • 79. VPNFilter & CyclopsBlink Scan-V Represents A Mechanism To Automate, Control, & Manage A Network Of Collection Nodes & ORBs For Cyber Operations - Scalability & Efficiency!
  • 80. SORM
  • 81. SORM
  • 82. SORM To Amesit Amesit Enables A Mobile, Flexible Deployment Of SORM-Like Capabilities, Including For INFORMATION & INFLUENCE OPERATION PURPOSES. Can Also Be “Forward Deployed.”
  • 87. PRC CNO & IO Operations
  • 88. PRC CNO & IO Operations Great Cannon Is Nearly 10 Years Old Now - Disclosed In 2015!
  • 89. PRC CNO & IO Operations Great Cannon Is Nearly 10 Years Old Now - Disclosed In 2015! PRC (Likely) Continues To Invest & Innovate In Cyber Operations
  • 90. PRC CNO & IO Operations Great Cannon Is Nearly 10 Years Old Now - Disclosed In 2015! PRC (Likely) Continues To Invest & Innovate In Cyber Operations Widespread Intrusion Ops - Exchange, Barracuda ESGs, Emphasize This!
  • 91. PRC CNO & IO Operations Great Firewall & Great Cannon Functionality Give Glimpses Of Similar Ambitions & Programs - Main Question Is Scalability & Management Of These Capabilities & Widespread Intrusion Campaigns
  • 92. The United States & FVEY Hey - Remember The Snowden Leaks?
  • 93. The United States & FVEY Hey - Remember The Snowden Leaks? NOTE THAT THE FOLLOWING SLIDES ARE BASED ON PUBLIC COMMENTARY AND POSTING HERE NEITHER CONFIRMS NOR DENIES THE ACCURACY OR VERACITY OF THESE ITEMS!
  • 94. NSA Leaks & Implications
  • 95. NSA Leaks & Implications Popular Conception
  • 96. NSA Leaks & Implications Popular Conception ● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies ● Clearly Important - But Hardly The Limit Of What Was Disclosed
  • 97. NSA Leaks & Implications Popular Conception ● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies ● Clearly Important - But Hardly The Limit Of What Was Disclosed Additional Details
  • 98. NSA Leaks & Implications Popular Conception ● Emphasis On Privacy Violations & Other Elements Detrimental To Open Democracies ● Clearly Important - But Hardly The Limit Of What Was Disclosed Additional Details ● Snowden (And Potentially Others) Disclosed SIGNIFICANT Information On CNO Capabilities & Tradecraft Beyond Privacy & Legality Issues! ● Less-Heralded But Arguably More Significant Were Widespread, Automated Exploitation & Control Frameworks
  • 99. A Quantum Of Exploitation
  • 100. A Quantum Of Exploitation
  • 101. A Quantum Of Exploitation
  • 103. Automated Exploitation At Scale QUANTUM, TURBINE, Etc. Represent Automated Exploit Systems
  • 104. Automated Exploitation At Scale QUANTUM, TURBINE, Etc. Represent Automated Exploit Systems Disclosed Publicly In Early 2010’s - Possibility Adversaries Identified Earlier
  • 105. Automated Exploitation At Scale QUANTUM, TURBINE, Etc. Represent Automated Exploit Systems Disclosed Publicly In Early 2010’s - Possibility Adversaries Identified Earlier Alleged FVEY “State Of The Art” In 2010 Now Reflected In RU, PRC Ops
  • 106. Snowden, Vulkan, & Beyond IF TRUE - Snowden Leaks Were Arguably A DISASTER For US, Related CNO & SIGINT Capabilities By Disclosing Methodology…
  • 107. Snowden, Vulkan, & Beyond IF TRUE - Snowden Leaks Were Arguably A DISASTER For US, Related CNO & SIGINT Capabilities By Disclosing Methodology… …It Also Appears That Multiple Parties Were Taking Notes On How To Build Similar (Or More Ambitious) Programs Based On Disclosures!
  • 108. The Future Of Offensive Cyber
  • 112. The Road To Scalable Cyber
  • 113. The Road To Scalable Cyber Cyber Talent Is Expensive - Codifying Capabilities In Technology & Programs Is Key To Expansive & Efficient Action! Personnel
  • 114. The Road To Scalable Cyber Cyber Talent Is Expensive - Codifying Capabilities In Technology & Programs Is Key To Expansive & Efficient Action! Personnel Global Ambitions Require Global Actions. Assumptions On Targeting & Focus Go Out The Window - Especially When Targets Can Be “Means To An End!” Targeting
  • 115. The Road To Scalable Cyber Cyber Talent Is Expensive - Codifying Capabilities In Technology & Programs Is Key To Expansive & Efficient Action! Personnel Global Ambitions Require Global Actions. Assumptions On Targeting & Focus Go Out The Window - Especially When Targets Can Be “Means To An End!” Targeting Top-Tier Threat Actors Know How Defenders & CTI Analysts Operate - They Will Work To Evade Known Analytical Tradecraft & Minimize Touchpoints Wherever Possible! Operational Security
  • 116. NTC Vulkan & CNO Vulkan Capabilities Are LAGGING Indicators - This Activity Has Already Taken Place!
  • 117. NTC Vulkan & CNO Vulkan Capabilities Are LAGGING Indicators - This Activity Has Already Taken Place! We Need To Anticipate Greater Degrees Of Automation, Queueing, & Reactive Targeting!
  • 118. What Should We Expect?
  • 119. What Should We Expect? Greater Automation & Improved Scalability
  • 120. What Should We Expect? Greater Automation & Improved Scalability Leverage “Neutral Web” For Offensive Action
  • 121. What Should We Expect? Greater Automation & Improved Scalability Reduced Reliance On “Rockstars” - Commoditization Leverage “Neutral Web” For Offensive Action
  • 122. What Should We Expect? Greater Automation & Improved Scalability Reduced Reliance On “Rockstars” - Commoditization Leverage “Neutral Web” For Offensive Action Actual, Meaningful Applications Of ML/AI
  • 124. Where Are We Now?
  • 125. Where Are We Now? But…
  • 126. Capability Inspiration & Proliferation
  • 127. Capability Inspiration & Proliferation Adversaries Learn From “Other Adversary” Operations & Open Source Research
  • 128. Capability Inspiration & Proliferation Adversaries Learn From “Other Adversary” Operations & Open Source Research Today’s Leak Or Disclosure Is Inspiration For Tomorrow’s Capability & Evolution
  • 129. Capability Inspiration & Proliferation Adversaries Learn From “Other Adversary” Operations & Open Source Research Today’s Leak Or Disclosure Is Inspiration For Tomorrow’s Capability & Evolution CNO Is NOT A Static Field - But A Constantly Evolving One With Multiple Factors
  • 132. Guidance For Defenders Adversaries Are CONSTANTLY Growing & Evolving Legacy Techniques & Tradecraft For Defense & Identification WILL FAIL
  • 133. Guidance For Defenders Adversaries Are CONSTANTLY Growing & Evolving Legacy Techniques & Tradecraft For Defense & Identification WILL FAIL Emphasis On Behavioral Analysis & Anomaly Detection, Enrichment Required!
  • 134. Guidance For Defenders If Adversaries Are Moving Towards Greater Automation & Efficiencies, Defenders Will Be LOST If We Do Not Do The Same!
  • 136. Advice For Offense Human-Drive Operations Are Rapidly Being Replaced In Ops
  • 137. Advice For Offense Human-Drive Operations Are Rapidly Being Replaced In Ops Adversary Emulation & Success Requires Understanding Trends
  • 138. Advice For Offense Human-Drive Operations Are Rapidly Being Replaced In Ops Adversary Emulation & Success Requires Understanding Trends Testing & Probing Will Become More Technically Challenging!
  • 139. Where Do We Go From Here? Networks Of Various Types Will Continue To Be Weaponized By Diverse Parties, Either As End-Targets Or Means To Reaching Them…
  • 140. Where Do We Go From Here? Networks Of Various Types Will Continue To Be Weaponized By Diverse Parties, Either As End-Targets Or Means To Reaching Them… …The Increasing Scale & Velocity Of Campaigns Will Make Defense & Response Challenging - But Not Impossible!
  • 142. Selected Works Cited ● The Vulkan Files - Papertrail Media (https://www.papertrailmedia.de/investigations/vulkan-files/) ● Vulkan Files - Der Spiegel (https://www.spiegel.de/thema/vulkanfiles/) ● “Secret Trove Offers Rare Look Into Russian Cyberwar Ambitions” - Craig Timberg, Ellen Nakashima, Hannes Munzinger, & Hakan Tanriverdi, The Washington Post (https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/) ● “‘Vulkan Files’ Leak Reveals Putin’s Global And Domestic Cyberwarfare Tactics” - Luke Harding, Stiliyana Simeonova, Manisha Ganguly, & Dan Sabbagh, The Guardian (https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics) ● “Contracts Identify Cyber Operations Projects From Russian Company NTC Vulkan” - Alden Wahlstrom, Gabby Roncone, Keith Lunden, & Daniel Kapellmann Zafra, Mandiant (https://www.mandiant.com/resources/blog/cyber-operations-russian-vulkan) ● “Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure” - Kevin Woolf & Bryce Livingston, Dragos (https://hub.dragos.com/hubfs/Dragos_IntelBrief_Russian-Programs-Threatening-Critical_Infrastructure.pdf) ● “Zeroing In On XENOTIME” - Joe Slowik, VirusBulletin (https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Zeroing-in-on-XENOTIME-analysis-of-the-entities-responsible-for-the-Tri ton-event.pdf) ● CyberWatchers Twitter Thread (https://threadreaderapp.com/thread/1615358254409986053.html) ● “New VPNFilter Malware Targets At Least 500k Networking Devices Worldwide” - William Largent, Cisco Talos (https://blog.talosintelligence.com/vpnfilter/) ● “New Sandworm Malware Cyclops Blink Replaces VPNFilter” - US CISA (https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-054a) ● “The Great Firewall Of China: Xi Jinping’s Internet Shutdown” - Elizabeth C. Economy, The Guardian (https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown) ● “China’s Great Cannon” - Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, & Vern Paxson, The Citizen Lab (https://citizenlab.ca/2015/04/chinas-great-cannon/) ● “A Close Look At The NSA’s Most Powerful Internet Attack Tool” - Nicolas Weaver, Wired (https://www.wired.com/2014/03/quantum/) ● “NSA’s Automated Hacking Engine Offers Hands-Free Pwning Of The World” - Sean Gallagher, Ars Technica (https://arstechnica.com/information-technology/2014/03/nsas-automated-hacking-engine-offers-hands-free-pwning-of-the-world/) ● “Hack Like The NSA: The Quantum Insert” - otw, HackersArise (https://www.hackers-arise.com/post/2016/09/09/hack-like-the-nsa-the-quantum-insert)
  • 143. Contact Info: ● joe@paralus.co ● @jfslowik - X/Mastodon/Bsky ● Signal (Talk To Me First!)