Главная
Study mode:
on
1
Intro
2
Outline
3
Discovery
4
Exploitation Chain (1)
5
Exploitation Chain (2)
6
Home-Made Exploit Development
7
Fake Yahoo Change Password Page
8
Context
9
Case 1: EConsul
10
Decoys
11
Network Communications
12
Result: "Execution Trace"
13
X-Agent Modules Windows Version
14
X-Agent Communication Channels
15
X-Agent iOS version
16
Technical Facts
17
Conclusion
Description:
Explore the tools and tactics of the Sednit cyber espionage group in this 37-minute conference talk from NorthSec 2015. Delve into their recent campaigns targeting Eastern Europe, focusing on Ukraine-related topics and custom exploit-kits. Examine the group's exploitation chain, home-made exploit development, and deception techniques like fake password change pages. Analyze the X-Agent malware's Windows and iOS versions, including its modules and communication channels. Gain insights into the group's technical capabilities and understand the broader context of their cyber espionage activities in Eastern Europe.

The Sednit Group, Cyber Espionage in Eastern Europe

NorthSec
Add to list
0:00 / 0:00