Thursday 5 October 09:30 - 10:00, Red room
Chia-Ching Fang (Trend Micro)
Shih-Hao Weng (Trend Micro)
An APT attack is often just the tip of the iceberg - researchers have to dive as deeply as possible in order to paint the whole picture. In 2011, one Japanese heavy industry firm, which is also one of biggest defence contractors in Japan, disclosed that it had been the target of APT attackers.
Six years have now passed, during which time we have been investigating and tracking the group, and we believe that this APT group is still active. Furthermore, the group's main targets are not only in Japan, but also in Korea, India and Russia. The high-value intelligence for them is defence-related.
In this talk, we will discuss how the group penetrates its targets and how it keeps enhancing its malware to avoid being detected. We will also demonstrate how victims are controlled, and the tools used. Moreover, we will describe the evolution of RAT and C&C communication protocols and how they make a great covert channel for evading network security devices.
This presentation will cover the following:
We will share our knowledge of the cutting-edge APT with attendees, and explore the skills and tools that the threat actors adopt. In the end, attendees will leave with a suitable defence strategy against Orca.