Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malware Mitigation Sample Detonation Intelligence Automation - Make Your Binaries Work

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from GrrCon 2018 that delves into the challenges and opportunities of malware mitigation through sample detonation and intelligence automation. Learn about the rise of machine learning in security technologies, its impact on file conviction, and the potential hindrances it poses for incident responders. Discover the desired malware workflow incorporating hybrid analysis techniques, including static and dynamic analysis, as well as threat intelligence correlation. Examine real-world examples of malware alerts, code overlap attribution, and targeted operations by threat actors like Berserk Bear. Gain insights into the evolving landscape of cybersecurity and the importance of adapting analysis methods to stay ahead of sophisticated threats.

Syllabus

Intro
THE RISE OF THE MACHINES.
AND MALWARE WORKFLOWS
A MACHINE LEARNING ALGORITHM WALKS INTO A BAR...
AND THE MACHINE LEARNING ALGORITHM SAYS...
HINDERING US A LITTLE AS INCIDENT RESPONDERS?
MACHINE LEARNING OUTPUT
PROBLEM STATEMENT
More and more security technologies are relying on machine learning for file conviction Greatly improves efficacy and elasticity of detection and prevention mechanisms Makes identifying exactly what is attacking you slightly more difficult Is heavily reliant on static analysis
MALWARE WORKFLOW WE WANT
HYBRID ANALYSIS
Static analysis Dynamic analysis Static analysis of dynamic data sets Threat intel correlation
OPPORTUNISTIC PRICE DISCRIMINATION!
MALWARE ALERT IN FALCON
CODE OVERLAP WITH DRIDEX - ATTRIBUTION
BERSERK BEAR HAS BEEN TARGETING ENGINEERING AND INDUSTRIAL CONTROL COMPANIES.
USED IN THESE OPERATIONS TO REGAIN CONTROL IN THE EVENT PRIMARY METHODS (STOLEN CREDENTIALS) ARE COMPROMISED.
BORING!
SEE YOU MONDAY!

Reviews

Start your review of Malware Mitigation Sample Detonation Intelligence Automation - Make Your Binaries Work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.