Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a complex cybersecurity case study examining how the Russian APT group Turla infiltrated Pakistani ISI command and control servers that were themselves targeting Indian, Syrian, and Afghan government systems. Learn about the intricate layers of this espionage campaign through detailed analysis of Turla's (also known as Secret Blizzard) sophisticated attack methods and infrastructure exploitation techniques. Discover how researchers uncovered this multi-layered operation, including documentation of the threat actors' shifting activities and evolving tactics. Examine Sidecopy's tradecraft and their strategic use of Hak5 equipment in their operations. Gain insights into the methodology used to map and trace Turla's extensive infrastructure network, understanding how advanced persistent threat groups operate within already compromised systems to create complex, nested attack scenarios that span multiple nation-state targets.
Syllabus
- Date/Time: Wednesday, 11:00–11:45
Taught by
BSidesLV