
52:27
nice music

52:28
Who invited St Myers?

52:40
Dan Melcher???

53:11
Jesus, the music was so loud, it annihilated by ears. Gone %100 deaf.

53:24
EHLO

53:54
Are these brain washing waves?

54:07
Welcome everyone!

54:08
Dan, your hat is 146% more sexy and applicable here

54:13
100 10x musicians

54:21
Hey all

55:31
Howdy Brian. Three ? is a bit dramatic!

55:35
Maybe at SAS :)

55:53
hey all

56:52
that background though...

01:06:35
The Heat Principle™

01:10:22
at the over 9000 mark ^.^

01:16:21
I feel the taste of SAS a bit now. Anyone else does?

01:16:34
+1

01:16:40
Hulquist brings taste of SAS.

01:16:55
Like a SAS dry rub

01:17:17
Awesome con, highly recommended

01:17:18
Hey JAGS!

01:17:22
one of the best conferences out there

01:17:24
:D

01:17:47
Make all the cons online?!?!

01:17:53
and their trainings ;)

01:18:30
Maaan, I so much miss SAS, with all the people and all the palinka

01:19:16
Take two shots, answer quick questions

01:19:36
I miss SAS too! :/

01:21:02
<.<

01:21:16
Take us back to Punta Cana

01:21:18
No Ted Cruz

01:21:42
Cancun was a super good location for sas

01:21:55
There were 3 amazing SASes in Cancun, this is true T_T

01:22:01
(Maybe 4?)

01:23:13
*clap clap clap* Seongsu!

01:24:32
Hi Seongsu!

01:34:29
If you want to read more about ThreatNeedle, check out the report we released today: https://securelist.com/lazarus-threatneedle/100803/

01:35:06
How many Microsoft engineers does Lazarus have on staff?

01:37:27
Assistant Attorney General John Demers described the three hackers [...] as "the world's leading bank robbers" and "a criminal syndicate with a flag.".

01:37:43
so, about ~3000

01:37:59
😂

01:38:07
1000 thousand AI robots to change a bulb.

01:44:13
Ishimaru-san, ieeeeei

01:44:15
Thanks for Good Presentation +_+

01:44:40
Great presentation on ThreatNeedle, thank you for sharing your research and what you observed :)

01:44:50
+1

01:44:52
Love listening to Suguru. Always a good time!

01:45:01
Ishimaru-san, cool!!

01:45:02
Maeda-san!!!

01:45:20
Thank you for showing ThreatNeedle to us!

01:45:24
Is McConkey in here?

01:45:40
+1000 Dave

01:46:04
A41APT41

01:47:07
Oh it makes sense definitely

01:47:07
Vitaly-san~~~ :)

01:47:14
:) Many APTs are not real APTs too

01:47:15
Just confusing to see without context

01:50:47
@Brian, Kris told me to relay that he wishes he could have attended! Instead his analysts are here taking notes, sorry :')

01:51:29
this is a great slide

01:52:25
Thanks Brian!

01:52:50
Can we get a timeline of exploits used like that last slide?

01:53:15
interesting they use blind key exchange!

01:53:22
Is that normal for Chinese groups?

01:54:00
(Assuming I Read that last slide correctly)

01:54:41
Provocative export function name :)

01:55:14
Please direct your Qs regarding the presentation to the Q&A box so we do not miss any of them :)

01:55:55
Do we ever see "stolen credentials" that would have been gotten only from SIGINT networks?

01:56:48
We say "Delete the eventlog" - do they do a full wipe or a selected entries delete?

01:57:19
Sounds like they yeet the logs.

01:57:30
Yeet!

01:58:43
I wonder how good the Lazarus group is at Starcraft2

01:59:31
That's a really good finding

01:59:36
and I wish it had a bullet-point on the slide

01:59:39
so we could share it more widely

01:59:52
Its been a while since I've played StarCraft 2

01:59:54
"I wonder how good the Lazarus group is at Starcraft2" => they still play starcraft 1.04 for sure

01:59:55
(Real world attacker finding Kerberos hosts that are due to be decommissioned but hanve't yet)

02:00:48
SC1 is hardcore <.<

02:00:59
Here is the link to the slide deck of the A41APT presentation: https://twitter.com/kaspersky/status/1364952544221495301

02:08:06
Sergio must be sooo happy right now :)

02:08:43
Diamond FTW

02:17:16
Yes, The attacker delete secutity logs for each works.

02:17:45
Great job! Thanks!

02:17:58
Thanks for the very nice A41APT research results! Otsukare-sama!

02:18:04
Oh damn Vitality is on

02:18:19
Great presentation!

02:18:36
Dont disconnect!

02:18:47
No no, we love your IDA Pro kung-fu

02:18:48
I am deifinitely disconnecting

02:19:05
midnight commander for the win :D

02:19:17
vmprotect is so annoying

02:19:22
What is he using to get this on the screen?

02:19:31
Can you unpack the riotgames valiant kernel module?

02:21:05
clicky clicky

02:22:45
@Anthony the video will be made available after ;)

02:23:57
What is the programs name here on the last section

02:24:27
Master Vitaly’s presentation magic is unparalleled

02:26:09
IDA TIME

02:28:56
@Keld, he’s using x64dbg (https://x64dbg.com/#start) which has Scylla built in if that’s what you were asking. Not sure if that was your question.

02:30:24
Thanks

02:31:49
Magic

02:33:03
Amazing

02:33:25
Ugg vmprotect

02:35:06
Is it possible to provide the samples, or the hashes, so that we can try by ourself? Thanks

02:44:16
I find it useful!

02:45:06
Super secret solution…Ask Vitaly to find a solution ;)

02:46:47
<3

02:46:50
Awesome job Master V

02:47:12
Thanks Vitaly

02:47:20
activate windows :))

02:47:24
Amazing presentations everyone!

02:47:48
hahaha

02:49:20
Will you share the IDApython script?

02:49:57
Yes

02:49:59
Yes!

02:50:06
Bloggie awards!

02:50:08
Yes please

02:50:12
MOAR for Securelist

02:50:15
+1

02:50:24
Awesome presentation! Thanks Vitaly!

02:50:27
Yes~ Thanks you !!!

02:50:49
Thank you, Vitaly! Great presentation!

02:51:23
Awesome demo!

02:53:06
You told them to disconnect!

02:53:07
50 people don’t know IDA / x64dbg

02:53:33
Brian, when are we getting a BITTER / Moses report?

02:53:49
Thank you all speakers, good night

02:53:51
Thank you all for the awesome presentations!

02:53:54
Thanks guys!

02:53:55
This week / early next

02:53:55
thanks for everything :)

02:53:59
<3

02:54:02
Thanks!

02:54:03
thanks to you all

02:54:03
Thanks, great presantation!

02:54:04
Great talks! Great conference as always! Thanks Kaspersky :)

02:54:10
thx!

02:54:14
I expect Dan to be dressed as the hamburgler for the US edition

02:54:15
stay tuned for more rumours about Hybrid-SAS.... later this year

02:54:17
Thank you guys!

02:54:30
thanks everybody!

02:54:41
thank you!

02:54:46
Thank you!

02:54:46
respect to all the speakers!!!!

02:55:20
If you interested in Reversing Malware training we are launching one at xtraining.kaspersky.com later this year. Stay tuned!

02:55:46
Reversing Malware Training - YEEESSS

02:56:21
"I expect Dan to be dressed as the hamburgler for the US edition " => 1 BTC , downpayment