DISCARDED: Tales From the Threat Research Trenches

Hiding In Plain Sight: Unique Methods Of C2 From Infostealers


Listen Later

Send us fan mail!

Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities.

Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and control. He emphasizes the team's engagement with the InfoSec community, highlighting the value of platforms like Twitter and Mastodon for sharing and receiving information.

We also dive into:
  • the unique challenges of crafting effective signatures
  • the specifics of malware, focusing on Vidar stealer and highlighting the dynamic nature of Vidar's command and control infrastructure
  • the distribution methods of these malware strains, from email campaigns to unconventional tactics like using video game platforms and social media for luring victims

Resources mentioned:

Intro to Traffic Analysis w/ Issac Shaughnessy
Emerging Threats Mastodon: https://infosec.exchange/@emergingthreats
Threat Insight Mastodon: https://infosec.exchange/@threatinsight
Vidar Stealer Picks Up Steam!

For more information, check out our website.
...more
View all episodesView all episodes
Download on the App Store

DISCARDED: Tales From the Threat Research TrenchesBy Proofpoint

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

55 ratings


More shows like DISCARDED: Tales From the Threat Research Trenches

View all
Hacked by Hacked

Hacked

190 Listeners

Risky Business by Patrick Gray

Risky Business

373 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,033 Listeners

Click Here by Recorded Future News

Click Here

423 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,116 Listeners

Three Buddy Problem by Security Conversations

Three Buddy Problem

61 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners

Adversary Universe Podcast by CrowdStrike

Adversary Universe Podcast

77 Listeners

Only Malware in the Building by DISCARDED | N2K Networks

Only Malware in the Building

8 Listeners