Advanced and inept persistent threats to be discussed at VB2017

Posted by   Martijn Grooten on   Jul 20, 2017

Only a few years ago, "APT" (advanced persistent threat) was a buzzword mostly heard being bandied around at security exhibitions to sell even more advanced technology to prevent, detect and remediate threats. And though people are right to point out that even the most powerful attackers use technology that is only as advanced as it needs to be (which can often be very basic, the spear-phishing used by Fancy Bear being a prime example), few will deny that well-funded, determined attackers are a real threat for many governments, enterprises and organizations.

The best we can do, then, is learn from such attacks, to help us to better defend our networks and to detect stealthy attackers.

This is why the VB2017 programme features several talks on such APTs. Cisco Talos researchers Paul Rascagneres and Warren Mercer, for example, will look at the reconnaissance phase of APTs, an essential part of any targeted campaign. Their paper also shows how attackers sometimes focus on software specific to their target of interest, in this case South Korea's Hangul Word Processor, or in the case of attacks discussed in a paper by Kaspersky Lab's Denis Legezo, InPage, a text processing and publishing program popular in India and Pakistan.

The best known APT group today is probably Fancy Bear (also known as APT28, Sofacy or Sednit), and Tiberius Axinte, a researcher from Bitdefender, will present a paper looking at this group's first known steps into the world of Mac malware.

Another important, though probably lesser known attack campaign is Operation Orca, which has targeted various countries in Asia; Chia-Ching Fang and Shih-Hao Weng from Trend Micro's Taiwanese office will present a paper highlighting the activities of this group.

And while you may think you will be able to attribute a specific group to a specific country, Juan Andres Guerrero-Saade and Costin Raiu warn against jumping to quick conclusions when it comes to attribution. The two Kaspersky Lab researchers, who have been involved in some of the most important APT investigations, will present a paper on fourth-party collection, and how attackers taking over other attackers' infrastructure makes attribution even more difficult.

jags_costinraiu_vb2015_2.png

Juan Andres Guerrero-Saade and Costin Raiu, here speaking at VB2015, will be back with a talk on fourth-party collection and its implications for threat attribution.


There are many other papers on the programme that deal with or are relevant to APTs. For example, a paper by Bart Parys looks at the attacks faced by his employer, PwC, while Nelson Murilo Rufino (Pangeia) will discuss the 20-year-old Chkrootkit tool that he wrote and which can help detect advanced attacks against Linux servers.

Still, not all attacks are APTs and not all attackers are advanced, even if they may still be persistent. A good example of the latter is discussed in a paper by Adam Haertlé, on an "inept persistent threat", in which he rather hilariously describes the steps taken in the world of cybercrime by a Polish hacker who is as determined as he is clueless.

We will soon open the call for last-minute papers for VB2017, to fill ten remaining slots with talks on the latest attacks. No doubt, some of them will deal with threats from very persistent attackers, whether their skills are advanced or inept.

In the meantime, don't forget to book your place for the conference before it's too late!

VB2017-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 video: The Big Bang Theory by APT-C-23

Today, we release the video of the VB2018 presentation by Check Point researcher Aseel Kayal, who connected the various dots relating to campaigns by the APT-C-23 threat group.

VB2019 London - join us for the most international threat intelligence conference!

VB calls on organisations and individuals involved in threat intelligence from around the world to participate in next year's Virus Bulletin conference.

VB2018 paper: Tracking Mirai variants

Today, we publish the VB2018 paper by Qihoo 360 researchers Ya Liu and Hui Wang, on extracting data from variants of the Mirai botnet to classify and track variants.

VB2018 paper: Hide'n'Seek: an adaptive peer-to-peer IoT botnet

2018 has seen an increase in the variety of botnets living on the Internet of Things - such as Hide'N'Seek, which is notable for its use of peer-to-peer for command-and-control communication. Today, we publish the VB2018 paper by Bitdefender…

New paper: Botception: botnet distributes script with bot capabilities

In a new paper, Avast researchers Jan Sirmer and Adolf Streda look at how a spam campaign sent via the Necurs botnet was delivering the Flawed Ammyy RAT. As well as publishing the paper, we have also released the video of the reseachers' VB2018…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.