Supply Chain Attack Through CCleaner - Evidence Aurora Operation Still Active
Offered By: Security BSides San Francisco via YouTube
Course Description
Overview
Explore the intricacies of a sophisticated supply chain attack through CCleaner in this 27-minute conference talk from BSidesSF 2018. Delve into the details of how hackers compromised millions of accounts, targeting specific telecom equipment companies in the United States, Japan, South Korea, and Taiwan. Examine the evidence suggesting the involvement of APT17, also known as Operation Aurora, and their specialized tactics in supply chain attacks. Analyze the complexity and quality of the CCleaner attack, including the unique implementation of base64 encoding and its connection to previous APT17 operations. Gain insights into the stages of the attack, code reuse detection, and the implications of state-sponsored cyber operations. Learn key takeaways about supply chain vulnerabilities and the ongoing threat landscape in this informative presentation by Itai Tevet.
Syllabus
Intro
ABOUT ME
TOPICS OF DICUSSION
WHAT IS A SUPPLY CHAIN ATTACK?
RESULT OF SUPPLY CHAIN ATTACK
CASE STUDY: CCLEANER SUPPLY CHAIN ATTACK
CCLEANER ATTACKER OVERVIEW
TARGETS AND EFFECTIVENESS
CODE REUSE DETECTION
WHAT DO WE KNOW ABOUT APT 177
STAGE 1 - CODE REUSE
CODE EXAMPLES
STAGE 2 -CODE REUSE
KEY TAKEAWAYS
Taught by
Security BSides San Francisco
Related Courses
Supply Chain Cybersecurity: Preventing Supply Chain AttacksLinkedIn Learning Hardening Your Soft Software Supply Chain
Pluralsight 1-Click to Infiltrate Your Organization via Vulnerable VS Code Extensions
Ekoparty Security Conference via YouTube Adding Security for Reliable Continuous Delivery
Conf42 via YouTube 3CX Supply Chain Attack: Lessons Learned
LASCON via YouTube