Загрузка страницы

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

SANS Cyber Threat Intelligence Summit 2023

Luna Moth: A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
Oren Biderman, Senior Incident Response & Threat Hunting Expert, Sygnia
Noam Lifshitz, Incident Response Team Leader, Sygnia

Pivoting, or being able to move between indicators of compromise and up David Bianco's Pyramid of Pain to uncover the threat actor's tactics, techniques and procedures (TTPs) is a common practice in Cyber threat intelligence (CTI) operations. However, it is sometimes regarded more as a black art than a science. In this talk we will discuss a threat group dubbed "Luna Moth" that leverages call-back phishing techniques, as a case study to walk you through the process of leveraging indicators of compromise identified while responding to several security breaches to uncover the threat actor's infrastructure. The talk will include: 1. An overview of several breaches we investigated focusing on the attacker's modus operandi. 2. A breakdown of two techniques which were used to pivot between IOCs to uncover and track the threat actor infrastructure. 3. Example of employing automation to continuously monitor the threat actor's infrastructure.

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Видео A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
3 апреля 2023 г. 22:23:01
00:23:49
Другие видео канала
How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise ApproachHow to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise ApproachBeyond the Basics: The Role of LLM in Modern Threat IntelligenceBeyond the Basics: The Role of LLM in Modern Threat IntelligenceApplying Threat Intelligence Practically to Meet the Needs of an Evolving Regulatory EnvironmentApplying Threat Intelligence Practically to Meet the Needs of an Evolving Regulatory EnvironmentHow an Info Sharing Analysis Center Works w/ its Members to Improve Cyber Defenses for Their SectorHow an Info Sharing Analysis Center Works w/ its Members to Improve Cyber Defenses for Their SectorBridging the Intelligence Divide: Building CTI Blueprints for Value-Based ProductionBridging the Intelligence Divide: Building CTI Blueprints for Value-Based ProductionHow Threat Intelligence Helped Us Defend and Respond to a Nation-State-Sponsored Threat ActorHow Threat Intelligence Helped Us Defend and Respond to a Nation-State-Sponsored Threat ActorClustering Attacker Behavior: Connecting the Dots in the RaaS EcosystemClustering Attacker Behavior: Connecting the Dots in the RaaS EcosystemThreat Intelligence is a Fallacy, but I May be BiasedThreat Intelligence is a Fallacy, but I May be BiasedDeep Dive into Supply Chain Compromise: Hospitality’s Hidden RisksDeep Dive into Supply Chain Compromise: Hospitality’s Hidden RisksBeyond Cryptojacking: Studying Contemporary Malware in the CloudBeyond Cryptojacking: Studying Contemporary Malware in the CloudWhy Won’t They Listen? – ConnectingYour CTI to Decision MakersWhy Won’t They Listen? – ConnectingYour CTI to Decision MakersCybersecurity is GeoPolitical: Lessons From the Fight Against Mercenary Spyware ProliferationCybersecurity is GeoPolitical: Lessons From the Fight Against Mercenary Spyware ProliferationIntellimation: Guidance for Integrating Automation in Your Cyber Threat Intelligence ProgramIntellimation: Guidance for Integrating Automation in Your Cyber Threat Intelligence ProgramThe Cyber-Hobbit:There and Back Again in CTIThe Cyber-Hobbit:There and Back Again in CTINavigating the Digital Battlefield: A Framework for Geopolitical Cyber Risk AssessmentNavigating the Digital Battlefield: A Framework for Geopolitical Cyber Risk AssessmentSharing Compared: A Study on the Changing Landscape of CTI NetworkingSharing Compared: A Study on the Changing Landscape of CTI NetworkingLet’s Be Honest About MITRE ATT&CK® Mappings and the “So What”Let’s Be Honest About MITRE ATT&CK® Mappings and the “So What”Zero to CTI: A Novice’s Journey into Threat IntelligenceZero to CTI: A Novice’s Journey into Threat IntelligenceOSINTer: Automating the CTI Heavy Lifting the Open Source Way!OSINTer: Automating the CTI Heavy Lifting the Open Source Way!Revisiting the Indicator: Towards a Threat Intelligence OntologyRevisiting the Indicator: Towards a Threat Intelligence OntologySlow Cooking and Cyber Threat Intelligence: Cooking a High-Performing TeamSlow Cooking and Cyber Threat Intelligence: Cooking a High-Performing Team
Яндекс.Метрика