Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of a sophisticated cyber-attack campaign targeting high-profile institutions in Asia. Delve into the intricacies of a custom-built malware, its modular structure, and evolving tactics. Examine the attack chain, threat variants, and communication techniques employed by the malicious actors. Gain insights into the malware's capabilities and its impact on victims' data. Learn how threat intelligence systems detected the initial indicators of compromise and follow the investigation process. Understand the shift in cyber-attack strategies from infrastructure damage to silent monitoring and data theft. Conclude with a summary of findings and participate in an audience Q&A session to deepen your understanding of this complex cyber threat landscape.
Syllabus
Introduction
Attack Chain
Threat
Variants
Summary
Audience Questions
Taught by
Security BSides San Francisco