Thursday 5 October 09:30 - 10:00, Red roomChia-Ching Fang (Trend Micro)
An APT attack is often just the tip of the iceberg - researchers have to dive as deeply as possible in order to paint the whole picture. In 2011, one Japanese heavy industry firm, which is also one of biggest defence contractors in Japan, disclosed that it had been the target of APT attackers.
Six years have now passed, during which time we have been investigating and tracking the group, and we believe that this APT group is still active. Furthermore, the group's main targets are not only in Japan, but also in Korea, India and Russia. The high-value intelligence for them is defence-related.
In this talk, we will discuss how the group penetrates its targets and how it keeps enhancing its malware to avoid being detected. We will also demonstrate how victims are controlled, and the tools used. Moreover, we will describe the evolution of RAT and C&C communication protocols and how they make a great covert channel for evading network security devices.
This presentation will cover the following:
We will share our knowledge of the cutting-edge APT with attendees, and explore the skills and tools that the threat actors adopt. In the end, attendees will leave with a suitable defence strategy against Orca.
Chia-Ching Fang is a threat researcher at Trend Micro. He has over 12 years of experience in malware analysis, malicious document analysis, and vulnerability assessment. His current research focuses on targeted attacks and threat intelligence.
Shih-Hao Weng is a senior threat researcher at Trend Micro. He has focused on targeted attack investigation, incident response, and threat solution research for more than 15 years.
Tyrus Kamau (Euclid Consultancy)
The cyber threats Kenya faces range from basic hacking such as website defacements, financial fraud, social media account…
Tiberius Axinte (Bitdefender)
This paper provides an in-depth analysis of the macOS version of the APT28 component known as XAgent. We will dissect the…
John Graham-Cumming (Cloudflare)
In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…