Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to investigate sophisticated North Korean cyber intrusions through a detailed analysis of a BlueNoroff attack chain in this 23-minute conference talk. Examine the complete attack methodology from initial process injection techniques to advanced Objective-C keyloggers used by this DPRK-affiliated threat group. Discover the intricate tradecraft and evasion techniques employed in targeted attacks against macOS systems. Gain insights into reverse engineering malware, analyzing attack vectors, and understanding the tactics, techniques, and procedures (TTPs) used by state-sponsored threat actors. Explore practical incident response approaches and detection strategies for identifying similar intrusions on macOS environments through real-world case study analysis presented by macOS security researchers from Huntress.
Syllabus
#OBTS v8: “BlueNoroff’s Clues: Investigating a DPRK Intrusion” - Stuart Ashenbrenner & Alden Schmidt
Taught by
Objective-See Foundation