YoVDO

Hunting Malware on Linux Production Servers - The Windigo Backstory

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses DevOps Courses

Course Description

Overview

Explore the intricacies of hunting malware on Linux production servers in this comprehensive conference talk from DerbyCon 4. Delve into Operation Windigo, examining compromised infrastructure, expansion methods, and its advanced nature. Investigate the money trail and impact of this operation, including case expansions and out-of-band techniques. Analyze reconnaissance and deployment scripts, daily monitoring processes, and other script findings. Learn about network evasion tactics, including SSH tunnels, nginx reverse proxies, and IP-in-IP tunnels. Discover indicators of compromise and gain valuable insights into protecting Linux servers from sophisticated malware threats.

Syllabus

Hunting Malware on Linux Production Servers
What is Operation Windigo?
Compromised infrastructure
How does it expand?
Why advanced?
Money trail
Impact
Same crypto code
Case expansion
Going out-of-band
Devops operators?
Recon / Deployment scripts
Perl scripts
Eliminates evidence
Recon script (cont)
Deployment script (cont)
Daily monitoring script
Other scripts findings
The situation is
Protip
SUCCESS
Recap
Network evasion
SSH tunnels
nginx reverse proxies
nginx Cdorked config example
nginx Calfbot config example
What are IP in IP tunnels
Inside the tunnels
iptables
Indicators of Compromise
Closing words


Related Courses

Startup Engineering
Stanford University via Coursera
Developing Scalable Apps in Java
Google via Udacity
Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera
Cloud Networking
University of Illinois at Urbana-Champaign via Coursera
Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera