ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

"The Usual Suspects" - James Condon

Автор: fwd:cloudsec

Загружено: 2020-07-10

Просмотров: 652

Описание: "The Usual Suspects: A Look at Threat Actors Targeting the Cloud and their Battle for Superiority"
Speaker: James Condon (Lacework, Inc)
James Condon is Director of Research at Lacework, where he researches various cloud security topics. James is a security veteran with over 10 years of experience in incident response, intelligence analysis, and threat detection. Prior to Lacework, James was Director of Threat Research and Analysis at ProtectWise (acquired by Verizon). Prior to ProtectWise, James was an analyst at Mandiant where he provided network traffic analysis and forensics for several incident response engagements. James got his start in the security industry as a Special Agent in the Air Force Office of Special Investigations.
Abstract:
Do you ever wonder who is behind the cryptojacking attacks targeting the cloud? If you examine a compromised server you will notice multiple attackers creating a chaotic mess of cron jobs, services, processes, and network connections. You will see evidence of different entities attempting to grab a foothold on the victim system. This talk takes a look at the actors and their tactics behind this activity.

Cloud resources make a lucrative target for crypotjacking. To run a successful campaign an attacker must compromise servers and remain persistent long enough to turn a profit. To stay persistent the attacker must evade detection by the owners, typically by installing rootkits, adding multiple forms of persistence, and setting CPU limits to avoid alarms. Once this is complete mission accomplished right? Not quite.

As it turns out cryptojacking is so popular that many actors are competing for the same resources. This results in attackers booting out anyone else that gets in their way. As seen in malicious scripts and binaries, attackers scramble to keep up with other attacker TTPs all while managing infrastructure in hopes that it doesn’t get blacklisted.

This talk will discuss one of the first players to the game, the 8220 mining group, and how they target cloud-native technologies along with traditional applications. The very prolific group, Rocke, whose origins begin by forking an 8220 mining group github repo is examined along with their continually evolving tactics.. The talk also looks at Pacha, a group that adopts the tactics of their competitors while simultaneously disrupting their operations. Here you will learn about these groups and what they are likely to target. This talk is geared towards operators and incident responders who need to detect, prevent and remediate these attacks. It's also geared for those who are curious about what is happening behind the scenes and those who enjoy the quirks of attacker behavior.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
"The Usual Suspects" - James Condon

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

"All Your Trust Are Belong to Us" - Kesten Broughton

A Candid Perspective on the Cloud Threat Landscape: What’s Real, What’s Not, and What Should Change

A Candid Perspective on the Cloud Threat Landscape: What’s Real, What’s Not, and What Should Change

"Creating the AWS Account Controller — Your rules don't apply to me" - Ian Mckay

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Хакер демонстрирует самые безумные гаджеты в своем EDC

Хакер демонстрирует самые безумные гаджеты в своем EDC

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

The Cloud is a Spider Web: But with Broken Threads

The Cloud is a Spider Web: But with Broken Threads

Лекция от легенды ИИ в Стэнфорде

Лекция от легенды ИИ в Стэнфорде

🔐 Как общаться безопасно? Тестирую альтернативы Telegram

🔐 Как общаться безопасно? Тестирую альтернативы Telegram

Sweet Deception: Mastering AWS Honey Tokens to Detect and Outsmart Attackers

Sweet Deception: Mastering AWS Honey Tokens to Detect and Outsmart Attackers

STRIFEBOT: Attacking and Defending Snowflake Data-lakes

STRIFEBOT: Attacking and Defending Snowflake Data-lakes

ВСЕ ЧТО НУЖНО ЗНАТЬ ПРО LINUX

ВСЕ ЧТО НУЖНО ЗНАТЬ ПРО LINUX

Самый опасный фишинговый инструмент из когда-либо созданных

Самый опасный фишинговый инструмент из когда-либо созданных

Топ-13 инструментов для хакинга на 2026 год (с учетом будущих тенденций)

Топ-13 инструментов для хакинга на 2026 год (с учетом будущих тенденций)

F95: Роскомнадзор и MAX | Microsoft зло | Начальники | Huawei | PLD | Курсовые работы

F95: Роскомнадзор и MAX | Microsoft зло | Начальники | Huawei | PLD | Курсовые работы

Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP

Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP

Ransomware protection with immutable AWS Backup - it's complicated

Ransomware protection with immutable AWS Backup - it's complicated

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Как хакеры взламывают Google 2FA

Как хакеры взламывают Google 2FA

Deep Melodic Techno & Trance Journey – Hypnotic Mix for Travel

Deep Melodic Techno & Trance Journey – Hypnotic Mix for Travel

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]