Who Did It - How We Attributed Campaigns of a Cyber Mercenary
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a detailed investigation into the activities of a cyber mercenary known as Void Balaur in this 29-minute Black Hat conference talk. Uncover the actor's underground forum presence and examine their campaigns spanning from 2016 to 2021. Dive into pivoting methods, phishing techniques, and pricing structures for email hacking services. Analyze the mercenary's targeting patterns, including over 3000 targets worldwide and notable incidents in Uzbekistan. Compare Void Balaur's operations with those of Pawn Storm and examine their strategic targeting approach. Gain insights into the actor's working hours and days, and consider the effectiveness of current defenses against such cyber threats. Learn how attribution techniques were applied to unmask this elusive cyber mercenary operating without a public presence.
Syllabus
Intro
Imagine an investigative journalist
Indicators phishing campaign 2020
Pivoting Methods
General Phishing ?
Business Aviation ?
Rocket Hack
Prices e-mail hacking
Moto Void Balaur
Monitoring and patiently waiting
Enhanced monitoring
3000+ targets all over the world
Noteworthy targets
Uzbekistan incidents
Exact overlap with Pawn Storm
Comparing with Pawn Storm
Targeting of a big conglomerate
Void Balaur is worried
Strategic targeting
Working Hours of Void Balaur
Working Days
Defenses
Is this enough?
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube