Главная
Study mode:
on
1
Intro
2
Introduction & Agenda
3
Background
4
Massive Tracking Campaign Uncovered
5
Volexity's First Run-in
6
Quick Moving
7
Scanbox!
8
MFAIC Cambodia
9
64-bit Binaries - Leviathan/GreenCrew/APT 40
10
Lots of Data Collection
11
ASEAN Compromised
12
New Framework
13
Philippines National Security Council (NSC)
14
Keyloggers
15
Profiling Framework Victimology
16
Vietnamese NGOs and Individuals
17
Interesting Notes
18
Domains: Brand Impersonation
19
Targeting Whitelists
20
High Priority Targets
21
Mach Song Media with Internet Explorer
22
Logging In?
23
Last Chance...
24
OceanLotus Google Access
25
Post-blog Activity
26
Business as usual & Resuming Activities
27
Mid-to-Late 2018
28
Changes to Code & Infrastructure
29
New in 2019
30
OceanLotus Run Websites
31
Recap and Final Thoughts
32
Resources
Description:
Explore the tactics and operations of OceanLotus, one of the most advanced and pervasive threat groups active today, in this 51-minute RSA Conference talk. Delve into how this sophisticated group manages tracking, exploitation, and command and control operations globally. Discover the likelihood of being unknowingly tracked by OceanLotus and learn how digital surveillance campaigns evolve into full-fledged cyberespionage operations. Gain insights into unexpected origins of advanced persistent threats, examine how APT groups leverage government and NGO websites for targeted attacks, and understand the abuse of legitimate cloud services to bypass security controls. Uncover the group's massive tracking campaign, their use of Scanbox framework, and compromises of high-profile targets like ASEAN and the Philippines National Security Council. Analyze OceanLotus' evolving techniques, including brand impersonation, targeting whitelists, and changes in code and infrastructure. Suitable for those with a general understanding of APT threats, exploits, and spear phishing. Read more

Digital Surveillance and Cyberespionage at Scale

RSA Conference
Add to list
0:00 / 0:00