Главная
Study mode:
on
1
Introduction
2
Agenda
3
Timeline
4
Cost
5
The Report
6
Blue Team Learnings
7
Phishing Email
8
Overall fished accounts
9
What can you do
10
Pivot Recommendations
11
Additional DNC Compromises
12
Tools Used
13
Stolen Data
14
GRU Structure
15
GRU 7455
16
Recommendations
17
Endpoint Monitoring
18
Overall conclusions
Description:
Explore the critical security insights gleaned from the Mueller Report in this 21-minute conference talk by Arkadiy Tetelman at BSidesSF 2020. Delve into the forensic evidence surrounding the DNC and DCCC compromises, examining how access was gained, networks were traversed, and what organizations can do to enhance their defenses. Learn about phishing tactics, stolen data, GRU structure, and pivoting techniques used in the attacks. Gain valuable recommendations for endpoint monitoring and overall security improvements to protect against similar threats.

Non-Political Security Learnings from the Mueller Report

Security BSides San Francisco
Add to list