Talk Etay Maor

APT29&41: Cloudy with a chance of cyber attacks


DESCRIPTION

Threat actors are exploiting the trust and capabilities we provide to cloud applications. In the past we saw Living off the Land attacks, now it is Living off the Cloud! In this session we will dive into the techniques and demo these attacks as well as mitigation strategies


The session will cover how malware operators are now moving their entire infrastructure to cloud based services (legit ones). I will demonstrate attacks that utilize legit cloud services and show how attackers exfiltrate data using these services.


To be clear – these are NOT theoretical. I will be demoing the APT29 and APT41 attacks. I will also discuss a three layer approach (strategic, operational, and tactical) to defending against these threats.


Last but not least I will also tie these attacks with LOL attacks and touch upon how ChatGPT is changing the ease of creating LOL attacks.


WHY THE COMMITTEE CHOSE THIS TALK

To gain credibility and defeat the company defense threat actors begin using usual cloud services. To counter these upcoming threats one has to understand how they work. Etay will demonstrate this using real world examples.


SPEAKER

Etay Maor

Share by: