Enviar búsqueda
Cargar
Not-so Passive Sonar - Red October
•
1 recomendación
•
1,006 vistas
Kurt Baumgartner
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 8
Recomendados
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
Recomendados
Security horrors
Security horrors
Boy Baukema
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
Bangladesh Network Operators Group
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
Deception technology for advanced detection
Deception technology for advanced detection
Jisc
Ransomware
Ransomware
Armor
Revealing the dark web
Revealing the dark web
Veriato
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
Más contenido relacionado
La actualidad más candente
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Vinay Saranadagoudar
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Cyber crime trends in 2013
Cyber crime trends in 2013
The eCore Group
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Cyphort
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Cyphort
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
APNIC
Hacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
Internet Identifier SSR
Internet Identifier SSR
APNIC
La actualidad más candente
(20)
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORKS
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Osint {open source intelligence }
Osint {open source intelligence }
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Cyber crime trends in 2013
Cyber crime trends in 2013
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cybersecurity and data privacy
Cybersecurity and data privacy
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
Honeypots for proactively detecting security incidents
Honeypots for proactively detecting security incidents
Hacking and privacy threats
Hacking and privacy threats
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
Internet Identifier SSR
Internet Identifier SSR
Destacado
Learning With New Media
Learning With New Media
guesteaa1f
Recent Rogueware
Recent Rogueware
Kurt Baumgartner
שיוף סריגים
שיוף סריגים
goodvibes
AntiRE en Masse
AntiRE en Masse
Kurt Baumgartner
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
goodvibes
WiFi Insecurity2013
WiFi Insecurity2013
Kurt Baumgartner
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Kurt Baumgartner
Jamcracker
Jamcracker
Steve Crawford
Destacado
(8)
Learning With New Media
Learning With New Media
Recent Rogueware
Recent Rogueware
שיוף סריגים
שיוף סריגים
AntiRE en Masse
AntiRE en Masse
מצגת קורס אלקטרוניקה
מצגת קורס אלקטרוניקה
WiFi Insecurity2013
WiFi Insecurity2013
Billington 2013 IceFog APT
Billington 2013 IceFog APT
Jamcracker
Jamcracker
Similar a Not-so Passive Sonar - Red October
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
PR Americas
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
data68
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk
Splunk for Security
Splunk for Security
Gabrielle Knowles
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
Insider threat webinar slides no cn
Insider threat webinar slides no cn
DevOps.com
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Yuriy Yuzifovich
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Brian Metzger
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
SelectedPresentations
Corporate threat vector and landscape
Corporate threat vector and landscape
yohansurya2
Similar a Not-so Passive Sonar - Red October
(20)
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
Physical-Penetration-Presentation-Tina-Ellis.pptx
Physical-Penetration-Presentation-Tina-Ellis.pptx
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk for Security
Splunk for Security
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
Insider threat webinar slides no cn
Insider threat webinar slides no cn
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
Corporate threat vector and landscape
Corporate threat vector and landscape
Último
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Principled Technologies
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Último
(20)
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Not-so Passive Sonar - Red October
1.
Red October Tracking
Active CyberSONAR in 2012 Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team
2.
Long-Running Cyber-surveillance Campaign Perspectives
of Red October intelligence gathering Advanced Cyberespionage Network Unique Architecture Broad Target Variety Exploit Scrubbing Attacker Identifiers
3.
Advanced Cyberespionage Network Your
conclusions were all wrong, Ryan
4.
Unique Architecture Y'know, I
seen me a mermaid once. I even seen me a shark eat an octopus. Over 1,000 related files collected
5.
Broad Target Variety Various
diplomats, government agencies, geopolitical financial centers, and more Sources: 2012 KSN Data + Sinkhole activity
6.
Exploit Scrubbing Scrubbed CN-APT
spear Scrubbed CN-APT spear • CVE-2012-0158 • CVE-2010-3333 • CVE-2009-3129 Custom decoys Timely, relevant names Ongoing detection, AV-evasion, Advanced Exploit Prevention
7.
Attacker Identifiers Classifying and
locating Historical WHOIS Compiled Artifacts
8.
Thank You Questions,
comments, criticism? Kurt Baumgartner, Senior Security Researcher Global Research and Analysis Team kurt.baumgartner@kaspersky.com