Главная
Study mode:
on
1
Intro
2
C.K Chen @bletchley13
3
CyCraft in MITRE ATT&CK Evaluation
4
Outline
5
Cyberattack to semiconductor vendors
6
Group Chimera
7
Investigation Overview
8
Today's Case Study
9
Case A: Overview
10
Used Hosting Server for C2
11
Root Cause Analysis - PC-SHENNA
12
Remote Execution Tools
13
Root Cause Analysis - Server-LAUREN
14
NTDS.DIT Explanation
15
Root Cause Analysis - NB-CLAIR
16
Recon
17
Data Exfiltration
18
Powershell
19
Cyber Situation Graph
20
Archive Password
21
Leaked File Name
22
Actors' Digital Arsenal
23
Cobalt Strike Beacon
24
Cobalt Strike Components
25
Suspicious R-W-X Memory
26
Hybrid Payload: PE as Shellcode
27
Transfer Shellcode via Named Pipe
28
Mutated rar.exe
29
Forwarded Imports
30
Dumpert: Implementation
31
Impact of Skeletonkey Injector
32
Take Away - 2
Description:
Explore an in-depth analysis of Operation SemiChimera, a series of advanced persistent threat (APT) attacks targeting the semiconductor industry, particularly in Taiwan. Delve into the tactics, techniques, and procedures used by the threat actors, their potential motivations, and the devastating impact of stolen intellectual property. Gain valuable insights into the current cybersecurity landscape of Taiwan's semiconductor sector and learn from the experiences of companies that have improved their defenses. Understand the challenges facing the industry and discover practical strategies to protect against similar attacks. This presentation, delivered by cybersecurity experts from Cycraft, offers crucial information for semiconductor companies and security professionals looking to enhance their threat intelligence and defensive capabilities.

Operation SemiChimera

Hack In The Box Security Conference
Add to list