Who Did It - How We Attributed Campaigns of a Cyber Mercenary

Who Did It - How We Attributed Campaigns of a Cyber Mercenary

Black Hat via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Who Did It - How We Attributed Campaigns of a Cyber Mercenary

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Imagine an investigative journalist
  3. 3 Indicators phishing campaign 2020
  4. 4 Pivoting Methods
  5. 5 General Phishing ?
  6. 6 Business Aviation ?
  7. 7 Rocket Hack
  8. 8 Prices e-mail hacking
  9. 9 Moto Void Balaur
  10. 10 Monitoring and patiently waiting
  11. 11 Enhanced monitoring
  12. 12 3000+ targets all over the world
  13. 13 Noteworthy targets
  14. 14 Uzbekistan incidents
  15. 15 Exact overlap with Pawn Storm
  16. 16 Comparing with Pawn Storm
  17. 17 Targeting of a big conglomerate
  18. 18 Void Balaur is worried
  19. 19 Strategic targeting
  20. 20 Working Hours of Void Balaur
  21. 21 Working Days
  22. 22 Defenses
  23. 23 Is this enough?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.