YoVDO

Insight Into TTPs Of A Middle Eastern Threat Actor

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Explore the tactics, techniques, and procedures of MuddyWater, a Middle Eastern threat actor, in this 33-minute conference talk from the Hack In The Box Security Conference. Delve into the group's cyber espionage activities targeting government organizations and industries across the Middle East and Central Asia. Examine their spear-phishing techniques, macro-powered attachments, and various backdoors used for infiltration. Analyze the unique capabilities of their malware, including disk wiping and anti-analysis features. Discover how the threat actor uses hacked websites as PHP proxies for stealthy command and control communication. Learn about the evolution of MuddyWater's tools and strategies, from initial infection vectors to post-exploitation tools. Gain insights into the attacker's mistakes, including uncontrolled proxies, weak cryptography, and poor operational security. Benefit from the expertise of Jaromir Horejsi, a Trend Micro threat researcher, as he shares his findings on preventing and hunting these sophisticated threats.

Syllabus

Introduction
Infection vector
Delivery methods - documents
Delivery methods - trojanized keygens
Post-exploitation tools - Python
Infrastructure - backend
Attacker's mistakes - uncontrolled proxies
Attacker's mistakes - weak crypto
Attacker's mistakes - bad OPSEC
Conclusion


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube