No video

Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata - SANS CTI Summit

  Рет қаралды 3,545

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic organizations in the Asia-Pacific region, specifically in nations located along the South China Sea. This threat, which is thought to be aligned with the Chinese state and its espionage interests in the region, most commonly targets Vietnam, Malaysia, the Philippines, Indonesia, and India, utilizing historic exploits like CVE-2012-0158 delivered via phishing attachments.
This presentation seeks to demonstrate through the examination of metadata in Goblin Panda CVE-2012-0158 RTF phishing lures that a single phishing builder has been in continuous use by the group since 2010. Despite having undergone at least one major overhaul, the phishing builder creates unique RTF Tags within the phishing lures that analysts can leverage to correlate campaigns across diverse targets in different geographic regions. This presentation will demonstrate the geographic areas targeted by Goblin Panda, the varying nature of targeted victims (government, military, diplomatic, civil society/dissidents), and the evolution of the phishing builder from 2010 through 2018.
Michael Raggi (@aRtAGGI), Senior Cyber Intelligence Analyst, Anomali

Пікірлер: 6
@LtChachee
@LtChachee 5 жыл бұрын
Where can we view the slides?
@trekerwho4688
@trekerwho4688 5 жыл бұрын
Found it here. www.sans.org/cyber-security-summit/archives/file/summit-archive-1548184559.pdf
@Tacit_Tern
@Tacit_Tern 3 жыл бұрын
PLA Unit-61398
@indrakumari1854
@indrakumari1854 3 жыл бұрын
Sir, can I have your contact ? Its very urgent bz of my project.
@douginfotech
@douginfotech 5 жыл бұрын
Weak sauce
@HalfCupOfWater
@HalfCupOfWater 5 жыл бұрын
Maybe it's Schrodinger's sauce, both weak and strong.
SANS Threat Analysis Rundown (STAR)
59:41
SANS Digital Forensics and Incident Response
Рет қаралды 1,3 М.
Inside the Persistent Mind of a Chinese Nation-State Actor
29:56
SANS Digital Forensics and Incident Response
Рет қаралды 25 М.
Little brothers couldn't stay calm when they noticed a bin lorry #shorts
00:32
Fabiosa Best Lifehacks
Рет қаралды 21 МЛН
Happy birthday to you by Tsuriki Show
00:12
Tsuriki Show
Рет қаралды 12 МЛН
Analyzing Chinese Information Operations with Threat Intelligence
34:59
SANS Digital Forensics and Incident Response
Рет қаралды 3 М.
Deciphering Browser Hieroglyphics - SANS Digital Forensics and Incident Response Summit 2017
31:09
SANS Digital Forensics and Incident Response
Рет қаралды 3,3 М.
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 897 М.
Thinking DFIRently From Entry to Specialty
1:37:51
SANS Digital Forensics and Incident Response
Рет қаралды 2,8 М.
APT 101: Understanding Advanced Persistent Threats
41:25
Hive Systems
Рет қаралды 10 М.
Leveraging OSINT to Track Cyber Threat Actors
32:21
SANS Cyber Defense
Рет қаралды 2,7 М.
SANS Threat Analysis Rundown (STAR)
1:03:45
SANS Digital Forensics and Incident Response
Рет қаралды 1,3 М.
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Рет қаралды 2,8 МЛН