We can come back to the same threat actor we have seen before
10
Credentials parsing
11
Credentials validation
12
Automation of RDP probing
13
Sources of credentials
14
Another example: Electronic maker
15
Level of access
16
Primary targets in Organizatons
17
Example: Ryuk - use of old vulns
18
Access and lateral movements sales
19
The same seller
20
How access to acquired resources is sold
21
Empower of cloud technologies
22
Dedicated server with PP balance 21k USD
23
Lifecycle of compromised asset
24
Two more weeks, $500 000 ransom
25
1 more week, Not Paid, password published
Description:
Explore exploitation techniques and attacks on hosting assets in this 54-minute conference talk from the Hack In The Box Security Conference. Delve into the lifecycle of compromised network assets, examining real-world examples from honeypots and monitoring systems. Learn about common exploitation techniques used by attackers to gain initial footholds, methods of lateral movement within compromised networks, and the process of selling access to acquired resources. Discover how compromised assets are monetized while awaiting higher bidders, and investigate a case study revealing the consequences when an asset is sold to the highest bidder. Analyze attacker techniques in supply-chain attack scenarios and examine these cases from a defender's perspective. Identify potential red flags for incident response teams, understand attacker actions and intentions, and predict potential next steps. Gain valuable insights for network security analysts based on unique data analysis and views on attacker exploitation techniques. Presented by Vladimir Kropotov, a researcher with Trend Micro FTR team, and Fyodor Yarochkin, a researcher at Trend Micro and incident investigation volunteer at Academia Sinica.
Read more
Exploitation Techniques and Attacks on Hosting Assets and Access for Resale