Главная
Study mode:
on
1
Intro
2
THE ABUSE OF TRUST
3
OPERATION AURORA 2009
4
NOTPETYA 2017
5
SHADOWHAMMER 2019
6
CODE BREAKDOWN
7
PWNING OPEN SOURCE
8
SONARQUBE 11/2020
9
PLAN OF ATTACK
10
SOLARWINDS
11
Dependency Confusion Study
12
XCODESPY
13
CODECOV
14
KASEYA VSA AGENT HOT-FIX
15
2017 KINGSLAYER
16
2017 CCLEANER
17
2020 ABLE DESKTOP
18
2020 GOLDENSPY
19
TAKEAWAYS
20
PACKAGE HUNTER
Description:
Explore the evolution and impact of Chinese Advanced Persistent Threats (APTs) in software supply chain attacks through this comprehensive conference talk from BSidesLV 2022. Delve into notable incidents such as Operation Aurora, NotPetya, and ShadowHammer, examining their code breakdowns and attack methodologies. Investigate the exploitation of open-source software and the SonarQube breach. Analyze high-profile cases like SolarWinds, Dependency Confusion, XcodeSpy, and Kaseya VSA, along with other significant attacks from 2017 to 2020. Gain valuable insights into the abuse of trust, attack patterns, and essential takeaways for defending against these sophisticated threats in the software supply chain ecosystem.

Code Dependency - Chinese APTs in Software Supply Chain Attacks

BSidesLV
Add to list