YoVDO

Removing OPSEC from Cyber Predators and Threat Actors

Offered By: Ekoparty Security Conference via YouTube

Tags

Threat Intelligence Courses Cybersecurity Courses Digital Forensics Courses Malware Analysis Courses Social Engineering Courses Dark Web Courses Data Exfiltration Courses OPSEC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking proof of concept that challenges the effectiveness of OPSEC methods used by cyber predators and threat actors. Dive into the analysis of approximately 4Tb of logs extracted from infostealer malware, including Redline and Racoon. Learn how parsing this data to identify .onion sites led to the discovery of legitimate profiles of threat actors on social networks, government sites, and financial institutions. Understand how exfiltrated files and device information can serve as crucial evidence in computer forensic investigations. Discover the vulnerabilities in threat actors' security practices, such as the lack of 2FA implementation, despite their use of OPSEC techniques. Gain insights from Thiago Bordini, an experienced Head of Cyber Threat Intelligence, as he presents this eye-opening research at Ekoparty 2023, demonstrating that even sophisticated cybercriminals are susceptible to the same technological and procedural threats they exploit.

Syllabus

Removing OPSEC from Cyber Predators and Threat Actors - Tiago Bordini - Ekoparty 2023


Taught by

Ekoparty Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network