Главная
Study mode:
on
1
Intro
2
The Honeypot Research Goals
3
Single Stage Ransomware
4
Multi-Stage Ransomware
5
An Electric Transmission Substation Honeypot
6
Incident Timeline at a Glance
7
Persistence
8
Network Discovery
9
Credential Theft
Description:
Explore the evolution of ransomware attacks targeting critical infrastructure in this 29-minute RSA Conference talk by Israel Barak, CISO of Cybereason. Analyze the new Tactics, Techniques, and Procedures (TTPs) employed by cybercriminals as they shift from simple file encryption to sophisticated multistage attacks with hacking operation capabilities. Delve into a case study of an electric transmission substation honeypot, examining the incident timeline, persistence methods, network discovery techniques, and credential theft strategies. Gain valuable insights to better protect critical infrastructure networks from these advanced threats.

Critical Infrastructure Network Attacks - Code Red, Alert Network Operators

RSA Conference
Add to list
0:00 / 0:00