Главная
Study mode:
on
1
Intro
2
What is Supply Chain Attack?
3
ASUS Supply Chain Attack : Select Infection PC
4
ASUS Supply Chain Attack : TYPE - B
5
Case Study: Supply Chain Attack
6
Case A : Overview
7
Case B: Overview
8
Case B: Plug X malware
9
Case B : Select Infection PC
10
Case C: Overview
11
Case C: Hiding Attacker IP
12
Case C: Distribution Additional Malware
13
Case D: Overview Update server of
14
Case E : Overview
15
Case E : Hijacking account
16
Association Analysis: Select Infection PC
17
Association Analysis: Code Tampering
18
Association Analysis: ShadowPad
19
Association Analysis : Plugx Module
20
Association Analysis : Attacker IP
21
Attack Features and Strategies : ATT&CK Matrix
22
Defensive Strategy
Description:
Explore two strategies for supply chain attacks in this Hack In The Box Security Conference talk. Delve into the BARIUM APT group's tactics, techniques, and procedures (TTPs) used in various supply chain attacks, including the ASUS Operation ShadowHammer. Learn about the group's targeting of game and software development companies worldwide, their use of 'winnti' and 'PlugX' malware, and the Korea Internet & Security Agency's analysis of related incidents. Discover how attackers compromise software development environments and update servers to execute these sophisticated attacks. Gain insights from experienced cybersecurity professionals on intrusion analysis, malware detection, and defensive strategies against supply chain threats. Examine multiple case studies, explore the ATT&CK Matrix, and understand the importance of securing software development and distribution processes.

Two Strategies for Supply Chain Attacks

Hack In The Box Security Conference
Add to list