Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How STORM-2603 is Using DFIR Tools for Evil

Red Canary via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how the STORM-2603 threat actor exploits legitimate DFIR (Digital Forensics and Incident Response) tools for malicious purposes in this 32-minute cybersecurity webinar. Dive deep into ransomware operations potentially linked to Chinese-affiliated threat actors, examining their use of multiple ransomware variants including Warlock and Lockbit to demonstrate tactical versatility. Learn from guest speaker Phil Hagen about effective detection strategies and the critical challenges of converting threat intelligence reports into actionable security measures. Discover how legitimate tools like Velociraptor are being weaponized in attacks and understand the essential techniques for monitoring and distinguishing between legitimate and malicious tool usage. Master the importance of establishing network activity baselines and implementing rapid incident response protocols during ransomware incidents. Gain insights into the latest cybersecurity developments including OpenAI's Aardvark introduction and the release of the Atomic Red Team MCP server, while developing practical skills for threat hunting, threat intelligence analysis, and managed detection and response operations.

Syllabus

00:00 - 00:49: Intro
00:50 - 02:01: Welcome to Red Canary Office Hours
02:02 - 06:24: In the news: OpenAI introduces Aardvark
06:25 - 11:07: In the news: Atomic Red Team MCP server released
11:08 - 31:49: The hidden tunnels of STORM-2603's ransomware ops

Taught by

Red Canary

Reviews

Start your review of How STORM-2603 is Using DFIR Tools for Evil

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.