ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Squidoor: Unmasking a Sophisticated Multi-Platform Backdoor in APT Operations

Автор: Infosec In the City

Загружено: 2025-11-04

Просмотров: 79

Описание: Speaker:
Lior Rochberger, Senior Threat Researcher, Palo Alto Networks
Tom Fakterman, Senior Threat Researcher, Palo Alto Networks

This talk will delve into a highly sophisticated Chinese APT campaign, tracked as CL-STA-0049, that has been targeting governments, defense, telecommunication, education and aviation sectors in Southeast Asia and South America since at least March 2023. Drawing on our extensive threat hunting methodologies and in-depth analysis, attendees will gain a comprehensive understanding of this complex, multi-stage attack chain and its advanced evasion techniques designed to bypass traditional security measures.

The session will explore the complex and modular 'Squidoor' backdoor, a prime example of evolving state-sponsored tactics. We'll provide a detailed analysis of Squidoor's architecture, features, and capabilities, showcasing both its Windows and Linux versions. Participants will learn about its unprecedented array of 10 different C2 communication methods, including rarely seen techniques such as abusing Outlook for C2 communication, DNS tunneling, and ICMP tunneling.

We'll unveil our advanced threat hunting methodologies that led to the detection of this elusive campaign, offering insights into cutting-edge detection strategies. The presentation will equip security professionals with actionable knowledge on identifying and defending against such sophisticated threats, providing the latest intelligence on Chinese APT operations.

By the end of this talk, attendees will have gained valuable insights into advanced persistent threats, state-sponsored tactics, and innovative backdoor mechanisms. They will be better prepared to enhance their organization's threat detection and response capabilities, armed with strategies to defend against similar threats in their environments.

For more information about Infosec In the City, SINCON https://www.infosec-city.com/

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Squidoor: Unmasking a Sophisticated Multi-Platform Backdoor in APT Operations

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Navigating Today's Security Landscape: Insights and Strategies - by Abhishek Kumar Singh

Navigating Today's Security Landscape: Insights and Strategies - by Abhishek Kumar Singh

Hunting for Dark Pink: Uncovering APT Threats through Telegram C2 Message Extraction

Hunting for Dark Pink: Uncovering APT Threats through Telegram C2 Message Extraction

De-anonymizing Threat Actors and Exposing Their Infrastructure Using Infostealer Intelligence

De-anonymizing Threat Actors and Exposing Their Infrastructure Using Infostealer Intelligence

Zero Trust Architecture for Securing UAV Systems CYSE 587 Team A

Zero Trust Architecture for Securing UAV Systems CYSE 587 Team A

Interactive Python Shell in Embedded Systems - Faris Likic - embedded.ba 2025

Interactive Python Shell in Embedded Systems - Faris Likic - embedded.ba 2025

This might be my favorite new mini server...

This might be my favorite new mini server...

$1 vs $1,000,000,000 Футуристических Технологий!

$1 vs $1,000,000,000 Футуристических Технологий!

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Using Discord For C2 Operations - by Ilyas Jie En & Colby Tan

Using Discord For C2 Operations - by Ilyas Jie En & Colby Tan

Claude Code Ends SaaS, the Gemini + Siri Partnership, and Math Finally Solves AI | #224

Claude Code Ends SaaS, the Gemini + Siri Partnership, and Math Finally Solves AI | #224

2026: Всё Уже Решено - Вот Что Будет Дальше

2026: Всё Уже Решено - Вот Что Будет Дальше

Finding Adversary Infrastructure Before the Attack- Future Based Threat Intelligence by Ken Bagnall

Finding Adversary Infrastructure Before the Attack- Future Based Threat Intelligence by Ken Bagnall

2026 Год Конца Биткоина? Как Китайский CBDC Обнулит Рынок

2026 Год Конца Биткоина? Как Китайский CBDC Обнулит Рынок

From the Frontlines: Building Defences That Work - by Lesley Carhart

From the Frontlines: Building Defences That Work - by Lesley Carhart

Hunting for Zero Days in Large Applications - by Donavan Cheah

Hunting for Zero Days in Large Applications - by Donavan Cheah

Gary Marcus on the Massive Problems Facing AI & LLM Scaling | The Real Eisman Playbook Episode 42

Gary Marcus on the Massive Problems Facing AI & LLM Scaling | The Real Eisman Playbook Episode 42

DrawMeATree: The Master Key to WinDbg's Fortress - by Mathilde Venault

DrawMeATree: The Master Key to WinDbg's Fortress - by Mathilde Venault

How Can MCP Servers Attack You - 1/2

How Can MCP Servers Attack You - 1/2

it only took 2 characters

it only took 2 characters

Why Switzerland Is Quietly Adopting ICP The Sovereign Cloud Thesis

Why Switzerland Is Quietly Adopting ICP The Sovereign Cloud Thesis

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]