| 📡 | Arlington, VA and Virtual |
| đź’Ł | https://cyberwarcon.com |
| 📡 | Arlington, VA and Virtual |
| đź’Ł | https://cyberwarcon.com |
From microsoft. I wound up not using my virtual tickets and went outside.
The @CYBERWARCON sessions summarized below include:
“They are still berserk: Recent activities of BROMINE” – a lightning talk covering MSTIC’s analysis of BROMINE (aka Berserk Bear), recent observed activities, and potential changes in targeting and tactics.
“The phantom menace: A tale of Chinese nation-state hackers” – a deep dive into several of the Chinese nation-state actor sets, their operational security patterns, and case studies on related tactics, techniques, and procedures (TTPs).
“ZINC weaponizing open-source software” – a lighting talk on MSTIC and LinkedIn’s analysis of ZINC, a North Korea-based actor. This will be their first public joint presentation, demonstrating collaboration between MSTIC and LinkedIn’s threat intelligence teams.
Microsoft threat intelligence presented at #CyberWarCon 2022
Good observation over at the dying birdsite:
“The pattern at this #CYBERWARCON is that low-quality 2016 type of IO operations are not helpful anymore and now we are seeing APT actors working closely with IO to produce quality influence operation. Love where this is heading.” @dlshadothman
10 Phases of the Operations Kill Chain
1. Acquiring assets
2. Disguising assets
3. Gathering information
4. Coordinating + planning
5. Testing defenses
6. Evading detection
7. Indiscriminate engagement
8. Targeting engagement
9. Compromising assets
10. Enabling persistence
The Online Operations Kill Chain by Ben Nimmo and @hutch
What an amazing talk and I'm left wanting more. @aRtAGGI Job well done! 🎣
Trying hard to wait until break to crack into this report. https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea