Главная
Study mode:
on
1
RSAConference 2020 San Francisco February 24-28 Moscone Center
2
Contents
3
What is Supply Chain Attack?
4
ASUS Supply Chain Attack: Overview ASUS Update Server
5
ASUS Supply Chain Attack: Type - B
6
ASUS Supply Chain Attack: Select Infection PC
7
Case Study: Supply Chain Attack
8
Case A: Overview
9
Case A: Certificate signing
10
Case A: PlugX malware
11
Case B: Overview
12
Case B: Plug X malware
13
Case B: Code Tampering
14
Case B: Certificate signing
15
Case B: DGA Algorithm
16
Case B: Select Infection PC
17
Case C: Overview
18
Case C: Hiding attacker IP
19
Case C: PlugX malware
20
Case C: Certificate signing
21
Case C: Select Infection PC • Proxy_Pass : Setting variables set for proxy in the Nginx software
22
Case C: Distribution Additional Malware
23
Case D: Overview
24
Case D: PlugX malware
25
Case D: Hiding attacker IP
26
Case E: Overview
27
Case E: Hijacking account
28
Association Analysis: Select Infection PC
29
Association Analysis: Code Tampering ASUS
30
Association Analysis: Shadow Pad
31
Association Analysis: PlugX module
32
Association Analysis: Hiding attacker IP
33
Association Analysis: Attacker IP
34
Attack Features and Strategies: ATT&CK Matrix
35
Apply What You Have Learned Today
Description:
Explore a comprehensive analysis of supply chain attacks, focusing on the ASUS incident and various cases targeting Korean companies. Delve into two key strategies employed in these attacks: software development environment penetration and update server penetration. Examine artifacts, malware code similarities, and specific techniques used by attackers, including certificate signing, PlugX malware deployment, and selective infection methods. Learn about code tampering, DGA algorithms, and methods for hiding attacker IPs. Gain insights into the attackers' strategies mapped to the ATT&CK Matrix and discover practical applications of this knowledge in cybersecurity.

Chronicle of the Supply Chain Attack and Two Attack Strategies

RSA Conference
Add to list
00:00
-01:18