Completed
Case D: Overview
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Chronicle of the Supply Chain Attack and Two Attack Strategies
Automatically move to the next video in the Classroom when playback concludes
- 1 RSAConference 2020 San Francisco February 24-28 Moscone Center
- 2 Contents
- 3 What is Supply Chain Attack?
- 4 ASUS Supply Chain Attack: Overview ASUS Update Server
- 5 ASUS Supply Chain Attack: Type - B
- 6 ASUS Supply Chain Attack: Select Infection PC
- 7 Case Study: Supply Chain Attack
- 8 Case A: Overview
- 9 Case A: Certificate signing
- 10 Case A: PlugX malware
- 11 Case B: Overview
- 12 Case B: Plug X malware
- 13 Case B: Code Tampering
- 14 Case B: Certificate signing
- 15 Case B: DGA Algorithm
- 16 Case B: Select Infection PC
- 17 Case C: Overview
- 18 Case C: Hiding attacker IP
- 19 Case C: PlugX malware
- 20 Case C: Certificate signing
- 21 Case C: Select Infection PC • Proxy_Pass : Setting variables set for proxy in the Nginx software
- 22 Case C: Distribution Additional Malware
- 23 Case D: Overview
- 24 Case D: PlugX malware
- 25 Case D: Hiding attacker IP
- 26 Case E: Overview
- 27 Case E: Hijacking account
- 28 Association Analysis: Select Infection PC
- 29 Association Analysis: Code Tampering ASUS
- 30 Association Analysis: Shadow Pad
- 31 Association Analysis: PlugX module
- 32 Association Analysis: Hiding attacker IP
- 33 Association Analysis: Attacker IP
- 34 Attack Features and Strategies: ATT&CK Matrix
- 35 Apply What You Have Learned Today