Главная
Study mode:
on
1
Introduction
2
Agenda
3
Impact
4
Check Filmmaking Object
5
System Wiper
6
Injector Wiper
7
Webher Spreader
8
Configuration File
9
Complication Files
10
File Size
11
How I do it
12
Did it
13
Profile
14
Viper
15
Viper spreader
16
Content
17
Questions
18
Characteristics
19
Operation Troy
20
Communication
21
PDP
22
Global Resource Share
23
HTTP Comments
24
Similar payload
25
Version number
26
Version number 21
27
Mission 2013
28
Encryption
29
Operation Flame
30
Operation Flame 20
31
Army Class C
32
Sensitive Documents
33
PDB Files
34
Core Functions
35
Operation Name
36
Business Card
Description:
Explore a comprehensive analysis of the Wiper APT (Advanced Persistent Threat) in Korea and its global implications in this Black Hat conference talk. Delve into the intricacies of various wiper components, including the System Wiper, Injector Wiper, and Webher Spreader. Examine the configuration files, complication files, and file sizes associated with this malware. Gain insights into the speaker's investigative methods and profile the characteristics of the Viper spreader. Uncover the connections between Operation Troy, Operation Flame, and other related cyber campaigns. Analyze communication methods, payload similarities, and version numbers across different attacks. Investigate the 2013 mission, encryption techniques, and the targeting of sensitive documents. Understand the core functions and naming conventions of these operations, providing a thorough overview of this significant cyber threat landscape.

Make Troy, Not War - Case Study of the Wiper APT in Korea, and Beyond

Black Hat
Add to list
0:00 / 0:00