Главная
Study mode:
on
1
Intro
2
Device Location
3
Data Collection
4
Mobile Data
5
SMS Data
6
Infrastructure
7
Facebook Groups
8
Fishing Sites
9
Who Are These People
10
How Do They Do It
11
Rami Jabbar
12
Admin Logins
13
Testing Devices
14
GPS
15
DGS
16
Mobile
17
Conclusion
Description:
Explore the infrastructure and identities behind Dark Caracal in this 22-minute conference talk by Eva Galperin from EFF and Andrew Blaich from Lookout. Dive into the methods used to track down the operation's physical location, including device tracking, data collection, and analysis of mobile and SMS data. Examine the infrastructure utilized, such as Facebook groups and phishing sites. Uncover the individuals involved and their techniques, with a focus on key figures like Rami Jabbar. Learn about admin logins, testing devices, and the role of GPS in the investigation. Gain insights into the future implications of nation-state malware and campaigns in this revealing presentation from Kaspersky.

Dark Caracal Part II - Where in the World is Caracal?

Kaspersky
Add to list
0:00 / 0:00