Leviathan Command and Control Communications on Planet Earth - Kevin Thompson

Leviathan Command and Control Communications on Planet Earth - Kevin Thompson

via YouTube Direct link

C2 malware signatures

6 of 29

6 of 29

C2 malware signatures

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Leviathan Command and Control Communications on Planet Earth - Kevin Thompson

Automatically move to the next video in the Classroom when playback concludes

  1. 1 FireEye
  2. 2 Whoami
  3. 3 Leviathan
  4. 4 Data
  5. 5 Worldwide malware ecosystem
  6. 6 C2 malware signatures
  7. 7 Tactics, techniques, and procedures
  8. 8 Every industry vertical owned
  9. 9 Callbacks: ebb and flow
  10. 10 Knock Knock
  11. 11 Hiding in Plain Site
  12. 12 Callback destinations from South Korea
  13. 13 Hiding in plain "site"
  14. 14 Targeted Callbacks
  15. 15 Semantic signatures
  16. 16 World C2 network map
  17. 17 Connectivity and malware
  18. 18 Callbacks by vertical / country
  19. 19 The king of malware
  20. 20 USA: the top callback destination
  21. 21 March in Russia/Ukraine
  22. 22 Geopolitical reflection: Ukraine crisis
  23. 23 Callbacks to Russia
  24. 24 RU-UA unique callbacks by country
  25. 25 Unique country callbacks
  26. 26 Israel: traffic analysis
  27. 27 Geopolitical reflection: Israel-Gaza crisis
  28. 28 Unique callbacks: CA to IL (2014)
  29. 29 Contact Info

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.