They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs
Offered By: Black Hat via YouTube
Course Description
Overview
          Explore a Black Hat conference talk detailing the discovery of a crypto-mining worm targeting AWS credentials and its evolution into a sophisticated cloud-specific attack. Delve into the attackers' expanded toolkit, designed to steal more credentials from compromised cloud systems and exploit containerized Kubernetes environments. Learn about innovative techniques used to breach multiple cloud providers, and understand the implications of these attacks. Gain insights into the hackers' methods for initial access, persistence, and potential consequences. Examine key takeaways to enhance cloud security posture and protect against emerging threats in cloud and container environments.
        
Syllabus
Intro
Presentation Overview
Hackers Sent Us GIFs
Trust Set the Record Clear
Vulnerability Simulations
How They Get In
How They Maintain Access
What Could Happen
Key Takeaways
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube
