Threat Intel Analysis of Ukrainians Power Grid Hack

Threat Intel Analysis of Ukrainians Power Grid Hack

via YouTube Direct link

Stealing Files

19 of 33

19 of 33

Stealing Files

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Intel Analysis of Ukrainians Power Grid Hack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Indicators of Compromise
  3. 3 Pyramid of Pain
  4. 4 Tools Used
  5. 5 The Incident
  6. 6 Why
  7. 7 ICS
  8. 8 HMI
  9. 9 Tools
  10. 10 KillDisk
  11. 11 IP Address
  12. 12 Proxy Server
  13. 13 ICS Kill Chain
  14. 14 Stage 1 Microsoft Office
  15. 15 Stage 2 Spearfishing
  16. 16 BlackEnergy Installer
  17. 17 Driver
  18. 18 Main DLL
  19. 19 Stealing Files
  20. 20 Firmware Development
  21. 21 Attack
  22. 22 Sandworm
  23. 23 Why Ukraine
  24. 24 Timeline
  25. 25 Similarities
  26. 26 How can we solve that
  27. 27 Other vectors
  28. 28 The sleeper must awaken
  29. 29 Another pyramid
  30. 30 Power Grid Policies
  31. 31 Security Gap
  32. 32 Summary
  33. 33 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.