Suche senden
Hochladen
Not-so Passive Sonar - Red October
•
1 gefällt mir
•
1,006 views
Kurt Baumgartner
Folgen
Technologie
Melden
Teilen
Melden
Teilen
1 von 8
Empfohlen
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
Empfohlen
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
Weitere ähnliche Inhalte
Was ist angesagt?
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
Was ist angesagt?
(20)
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Osint {open source intelligence }
Osint {open source intelligence }
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Cyber crime trends in 2013
Cyber crime trends in 2013
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cybersecurity and data privacy
Cybersecurity and data privacy
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
Hacking and privacy threats
Hacking and privacy threats
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
Internet Identifier SSR
Internet Identifier SSR
Andere mochten auch
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
שיוף סריגים
שיוף סריגים
goodvibes
AntiRE en Masse
AntiRE en Masse
Kurt Baumgartner
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
goodvibes
WiFi Insecurity2013
WiFi Insecurity2013
Kurt Baumgartner
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Kurt Baumgartner
Jamcracker
Jamcracker
Steve Crawford
Andere mochten auch
(8)
Learning With New Media
Learning With New Media
Recent Rogueware
Recent Rogueware
שיוף סריגים
שיוף סריגים
AntiRE en Masse
AntiRE en Masse
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
WiFi Insecurity2013
WiFi Insecurity2013
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Jamcracker
Jamcracker
Ähnlich wie Not-so Passive Sonar - Red October
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
PR Americas
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
data68
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk
Splunk for Security
Splunk for Security
Gabrielle Knowles
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
Insider threat webinar slides no cn
Insider threat webinar slides no cn
DevOps.com
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Yuriy Yuzifovich
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Brian Metzger
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
SelectedPresentations
Corporate threat vector and landscape
Corporate threat vector and landscape
yohansurya2
Ähnlich wie Not-so Passive Sonar - Red October
(20)
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk for Security
Splunk for Security
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
Insider threat webinar slides no cn
Insider threat webinar slides no cn
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
Corporate threat vector and landscape
Corporate threat vector and landscape
Kürzlich hochgeladen
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Kürzlich hochgeladen
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Slack Application Development 101 Slides
Slack Application Development 101 Slides
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Not-so Passive Sonar - Red October
1.
Red October Tracking
Active CyberSONAR in 2012 Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team
2.
Long-Running Cyber-surveillance Campaign Perspectives
of Red October intelligence gathering Advanced Cyberespionage Network Unique Architecture Broad Target Variety Exploit Scrubbing Attacker Identifiers
3.
Advanced Cyberespionage Network Your
conclusions were all wrong, Ryan
4.
Unique Architecture Y'know, I
seen me a mermaid once. I even seen me a shark eat an octopus. Over 1,000 related files collected
5.
Broad Target Variety Various
diplomats, government agencies, geopolitical financial centers, and more Sources: 2012 KSN Data + Sinkhole activity
6.
Exploit Scrubbing Scrubbed CN-APT
spear Scrubbed CN-APT spear • CVE-2012-0158 • CVE-2010-3333 • CVE-2009-3129 Custom decoys Timely, relevant names Ongoing detection, AV-evasion, Advanced Exploit Prevention
7.
Attacker Identifiers Classifying and
locating Historical WHOIS Compiled Artifacts
8.
Thank You Questions,
comments, criticism? Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team kurt.baumgartner@kaspersky.com