A Practical Case of Threat Intelligence - From IoC to Unraveling an Attacker Infrastructure

  Рет қаралды 6,167

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

SANS Cyber Threat Intelligence Summit 2023
Luna Moth: A Practical Case of Threat Intelligence - From IoC to Unraveling an Attacker Infrastructure
Oren Biderman, Senior Incident Response & Threat Hunting Expert, Sygnia
Noam Lifshitz, Incident Response Team Leader, Sygnia
Pivoting, or being able to move between indicators of compromise and up David Bianco's Pyramid of Pain to uncover the threat actor's tactics, techniques and procedures (TTPs) is a common practice in Cyber threat intelligence (CTI) operations. However, it is sometimes regarded more as a black art than a science. In this talk we will discuss a threat group dubbed "Luna Moth" that leverages call-back phishing techniques, as a case study to walk you through the process of leveraging indicators of compromise identified while responding to several security breaches to uncover the threat actor's infrastructure. The talk will include: 1. An overview of several breaches we investigated focusing on the attacker's modus operandi. 2. A breakdown of two techniques which were used to pivot between IOCs to uncover and track the threat actor infrastructure. 3. Example of employing automation to continuously monitor the threat actor's infrastructure.
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u...

Пікірлер: 2
@dewardvide
@dewardvide 7 ай бұрын
Eye opening. Thank You!
@the-baker
@the-baker Жыл бұрын
That's very interesting. Thank you very much.
Deconstructing the Analyst Mindset
49:14
SANS Digital Forensics and Incident Response
Рет қаралды 7 М.
The Cycle of Cyber Threat Intelligence
1:00:27
SANS Digital Forensics and Incident Response
Рет қаралды 115 М.
АЗАРТНИК 4 |СЕЗОН 1 Серия
40:47
Inter Production
Рет қаралды 1,4 МЛН
Hunting Threat Actors Using OSINT
39:39
SANS Digital Forensics and Incident Response
Рет қаралды 13 М.
What Does an LLM-Powered Threat Intelligence Program Look Like?
40:11
HammerCon 2024: Cobalt Strike: Operational Security for Cyber Operators, Sean Phipps
29:15
Military Cyber Professionals Association
Рет қаралды 935
Handling Ransomware Incidents: What YOU Need to Know!
57:53
SANS Digital Forensics and Incident Response
Рет қаралды 17 М.
Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017
26:41
SANS Digital Forensics and Incident Response
Рет қаралды 6 М.
Generative AI in a Nutshell - how to survive and thrive in the age of AI
17:57
Job Role Spotlight: Cyber Threat Intelligence
29:03
SANS Institute
Рет қаралды 11 М.
АЗАРТНИК 4 |СЕЗОН 1 Серия
40:47
Inter Production
Рет қаралды 1,4 МЛН