YoVDO

The Snake Keeps Reinventing Itself

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Malware Analysis Courses Threat Intelligence Courses

Course Description

Overview

Explore the evolution and tactics of a sophisticated malware known as "The Snake" in this 45-minute conference talk from Hack.lu 2018. Delve into the four main steps of its operation, including infection vectors, fake flashing techniques, and the full infection cycle. Examine possible explanations for its spread, such as ISP compromise and lateral movement. Learn about the malware's cleaning processes, output backdoor, and the intricacies of its outlook output protocol manager. Witness a live demonstration of the backdoor in action and gain insights into effective monitoring strategies. Enhance your understanding of advanced persistent threats and cybersecurity measures through this comprehensive analysis presented by security experts Jean-Ian Boutin and Matthieu Faou.

Syllabus

Introduction
Overview
The Snake
Four Main Steps
Infection vectors
Fake flashing star
Full infection cycle
Possible explanations
ISP compromise
Lateral movement
Cleaning
Output Backdoor
Outlook Output Protocol Manager
The Backdoor
Demo
Monitoring
Conclusion


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network