Главная
Study mode:
on
1
Introduction
2
Why we are based in Taiwan
3
Benson
4
Taiwan
5
Air Leaks
6
IP Addresses
7
Random Accounts
8
Emails
9
Taiwan APT Playground
10
Taiwan APT Campaigns
11
Detectability
12
APT Life Cycle
13
Binary Day Drop
14
Debugging Symbols
15
Similar Mail
16
Fast Cars
17
At least Male
18
Second Car
19
Garage
20
Group IP Rates
21
Host Label
22
DoD
23
Labeling
24
Workflow
25
Cross mapping
26
Traditional botnet model
27
Multiple chicken farms
28
Automation
29
How they do this
30
Where are the chickens
31
Travel
32
People
33
Farmers
34
Timing Correlation
35
Virtual Machines
36
Sandbox Engine 3
37
Yara Rules
38
CACAP Server
39
Other Tools
40
Reverse Lookup
41
Screenshot
42
QA
Description:
Explore an in-depth analysis of escalated Advanced Persistent Threat (APT) attacks in this Black Hat USA 2013 conference talk. Delve into the research conducted by Xecure-Lab and Academia Sinica on targeted attack operations across the Taiwan Strait. Learn about the development of XecScan 2.0, an automated system equipped with dynamic and static malicious software forensics technology for analyzing APT emails, malware, and document exploits. Discover the unique perspective on APT attacks targeting Taiwan due to its network infrastructure and political position. Gain insights into the comparison between APT1 samples and those discovered in Taiwan, along with the history of APT1 hacker activities. Understand the APT life cycle, detection methods, and the importance of automation in combating these threats. Explore topics such as binary day drops, debugging symbols, IP rates, and sandbox engines. Get access to a free, publicly accessible portal for collaborative APT classification and XecScan 2.0 APIs. Read more

Hunting the Shadows - In Depth Analysis of Escalated APT Attacks

Black Hat
Add to list
0:00 / 0:00