Analyzing and Understanding CRASHOVERRIDE - ICS Cybersecurity Webcast
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore the analysis and reverse engineering of CRASHOVERRIDE in this 57-minute webcast recording from Dragos: ICS Cybersecurity. Delve into the known and unknown aspects of the CRASHOVERRIDE framework and its impact on grid operations. Gain insights into the background, technical details, and mitigation strategies for this cybersecurity threat. Examine the investigation timeline, Ukrainian power outage incident, and the framework's components including initial intrusion, persistence, launcher modules, and payload modules. Learn about the IEC 104 module execution flow, wiper module functionality, and potential grid impact scenarios. Discover detection methods for CRASHOVERRIDE on host systems and through Yara rules. Understand key nodes for defeating CRASHOVERRIDE and access additional resources provided by Dragos.
Syllabus
Intro
Background: By the numbers
Dragos Investigation
Dragos Timeline
Ukrainian Power Outage
CRASHOVERRIDE Framework
Initial Intrusion
Time Stamps Tell a Story
Persistence
Launcher Module Crash Caller
Launcher Module: Wiper Thread
Payload Modules
IEC 104 Module Execution Flow
IEC 104 Module Configuration File
Wiper Module: Flow
Wiper Module: File Extensions
Grid Scenarios: Impact
Detecting CRASHOVERRIDE - Host
Detecting CRASHOVERRIDE - Yara
Defeating CRASHOVERRIDE: Key Nodes
CRASHOVERRIDE Resources
Dragos Ecosystem
Taught by
Dragos: ICS Cybersecurity
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam