Big Game Hunting The Peculiarities Of Nation State Malware Research

Subscribers:
6,410
Published on ● Video Link: https://www.youtube.com/watch?v=t6U3LyM7WdA



Duration: 50:29
6 views
0


The security industry focus on state-sponsored espionage is a relatively recent phenomenon. Since the Aurora Incident brought nation-state hacking into the spotlight, there's been high profile reports on targeted hacking by China, Russia, U.S.A, Israel, to name a few. This has lead to the rise of a lucrative Threat intelligence business, propelling marketing and media campaigns and fueling political debate.

This talk will cover the idiosyncrasies of nation-state malware research using the experiences of presenters in the 'Threat Analyst Sweatshop.' Regin (aka WARRIORPRIDE, allegedly written by the Five Eyes) and Babar (aka SNOWGLOBE, allegedly written by France) will be used as case studies in examining attribution difficulties. Additionally, we'll examine attributing commercially written offensive software (implants and exploits) and the (mostly negative) vendor responses. We'll cover what happens when you find other players on the hunt, and address the public misconception that attribution is frequently done using open source information.

We will focus on the attribution problem and present a novel approach on creating credible links between binaries originating from the same group of authors. Our goal is to add to transparency in attribution and supply analysts with a tool to emphasize or deny vendor statements. The technique is based on features derived from different domains, such as implementation details, applied evasion techniques, classical malware traits or infrastructure attributes; which are then leveraged to compare the handwriting among binaries.

PRESENTED BY
Morgan Marquis-Boire, Marion Marschalek, Claudio Guarnieri

Black Hat - USA - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
information
hack
online
password
code
web
protection
network
scam
malware
secure
software
access
safety
system
firewall
communication
business
privacy
account
spy
programmer
program
spyware
hacked
hacking conference
conference
how to
2022
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Morgan Marquis-Boire
Marion Marschalek
Claudio Guarnieri
endpoint
research