Wake me up till SAS summit ends
2021-09-23 22:59:39 Author: securelist.com(查看原文) 阅读量:39 收藏

Events

Events

minute read

Kaspersky Security Analyst Summit, SAS at Home 2021

What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All these topics will be mentioned during the new SAS@Home online conference, scheduled for September 28th-29th, 2021. To be more specific, there will be a workshop titled, “Prevent & Detect Security Threats in the Kubernetes Era” and a presentation titled, “Time to Make the Donuts”, the latter presumably not about actual doughnuts. As for cyberthreats, this topic is always on the table because it is the phenomenon we confront every day and the cause that unites us researchers.

What else can we offer during the two eventful days?

  • Kaspersky experts Igor Kuznetsov and Georgy Kucherin will tell a story of how they investigated top-class commercial spyware and dissected an infamous toolset.
  • Rintaro Koike, Shogo Hayashi and Ryuichi Tanabe of NTT Security, Japan will present a research paper, titled, “Operation Software Concepts: A Beautiful Envelope for Wrapping Weapon”.
  • Ivan Kwiatkowski and Pierre Delcher of Kaspersky GReAT will describe possible links between the Tomiris malware and the supply-chain attacks on Solarwind.
  • PWC’s John Southworth will teach the audience to dance with APT41.
  • More details about the GhostEmperor APT, tools to catch zero-click zero-days, supply-chain attacks in Farsi and, of course, our usual workshops.

Last but not least, we are preparing worthy challenges for everyone interested in malware analysis and threat hunting. During SAS@Home, the 9th Edition of our, by now well-established, CTF/Hackgame, players will compete in five categories, trying to solve challenges presented by CTF hosts David Jacoby and Marco Preuss. This year, we will have the following categories: kNOW yOUR eNEMY, dEBUGGERS pARADISE, oLDsKOOL, cODEbREAKER and THE WiLD WEB, each with five amazing levels. You do not need to be a reversing wizard, guru programmer or ninja analyst – there is something for everyone to tackle and solve.

At the end, the top five players will win a seat at Kaspersky xTraining, worth $1,400! However, our game is not just about prizes, but having fun and learning something new. Always remember: you cannot loose anything, but you can win it all.

Reports

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.


文章来源: https://securelist.com/sas-at-home-2021/104303/
如有侵权请联系:admin#unsafe.sh