Every day there is a lot of interesting news related to cybersecurity.
Many of these news items are closely related to topics discussed in my Cybersecurity course.
Sometimes these news are very closely related to the lectures of a few days ago.
Yesterday was a very interesting day in this respect.
On Tuesday we discussed how to attribute a specific attack campaign to a specific threat group, what IoCs (Indicators of Compromise) are, their role in attribution, and how they can be used by a defender.
Yesterday I found a report that discusses all these issues in a nice and easy to read way, with reference to a specific attack campaign attributed to a Chinese threat group. The report includes a technical description of the software tools used, including "living off the land" tools (another term we discussed), a description of the download and execution steps of the infection chain and, of course, a mapping to the MITRE ATT&CK Enterprise Matrix (the report mentions LSASS dumping, a very important and complex topic that we will discuss later in the course).
Operation FishMedley - ESET researchers detail a global espionage operationOn Monday we pointed out that the threat of phishing should never be underestimated and discussed why.
This morning I found a very surprising report in this area. A very famous cybersecurity expert, one who is extremely competent in the field of password stealing (he is the creator of haveibeenpwned, a famous website for checking whether a given credential has been found in a data breach, used by cybersecurity services of several countries and which we will soon be discussing in the course) fell victim (!) to a phishing attack.
He received a convincing email, he clicked on a link in the email, he entered his credentials... which ended up in the hands of an attacker (!). The fact that Troy Hunt fell victim to a phishing attack is almost unbelievable. Please believe me :)
Commenti