Zoom Logo

GReAT Ideas. Green Tea Edition - Shared screen with speaker view
Julio Canto
52:27
nice music
Brian
52:28
Who invited St Myers?
Brian
52:40
Dan Melcher???
Facundo Muñoz
53:11
Jesus, the music was so loud, it annihilated by ears. Gone %100 deaf.
Vitaly
53:24
EHLO
Vitor Ventura
53:54
Are these brain washing waves?
Kaspersky Events
54:07
Welcome everyone!
jeff esposito
54:08
Dan, your hat is 146% more sexy and applicable here
Brian
54:13
100 10x musicians
Gil Elliot
54:21
Hey all
Dan Melcher
55:31
Howdy Brian. Three ? is a bit dramatic!
Brian
55:35
Maybe at SAS :)
Costin Raiu
55:53
hey all
Brenton Chang
56:52
that background though...
Dan Melcher
01:06:35
The Heat Principle™
Dan
01:10:22
at the over 9000 mark ^.^
Vitaly
01:16:21
I feel the taste of SAS a bit now. Anyone else does?
Silas Cutler
01:16:34
+1
Juan Andres Guerrero-Saade
01:16:40
Hulquist brings taste of SAS.
Juan Andres Guerrero-Saade
01:16:55
Like a SAS dry rub
Gil Elliot
01:17:17
Awesome con, highly recommended
Bob Thomas
01:17:18
Hey JAGS!
Pasquale Stirparo
01:17:22
one of the best conferences out there
Juan Andres Guerrero-Saade
01:17:24
:D
Abbed A
01:17:47
Make all the cons online?!?!
Abbed A
01:17:53
and their trainings ;)
Dan
01:18:30
Maaan, I so much miss SAS, with all the people and all the palinka
Juan Andres Guerrero-Saade
01:19:16
Take two shots, answer quick questions
Noushin Shabab
01:19:36
I miss SAS too! :/
Juan Andres Guerrero-Saade
01:21:02
<.<
Juan Andres Guerrero-Saade
01:21:16
Take us back to Punta Cana
Juan Andres Guerrero-Saade
01:21:18
No Ted Cruz
Julio Canto
01:21:42
Cancun was a super good location for sas
Juan Andres Guerrero-Saade
01:21:55
There were 3 amazing SASes in Cancun, this is true T_T
Juan Andres Guerrero-Saade
01:22:01
(Maybe 4?)
Juan Andres Guerrero-Saade
01:23:13
*clap clap clap* Seongsu!
Shu En Liew
01:24:32
Hi Seongsu!
Kaspersky Events
01:34:29
If you want to read more about ThreatNeedle, check out the report we released today: https://securelist.com/lazarus-threatneedle/100803/
Juan Andres Guerrero-Saade
01:35:06
How many Microsoft engineers does Lazarus have on staff?
Costin Raiu
01:37:27
Assistant Attorney General John Demers described the three hackers [...] as "the world's leading bank robbers" and "a criminal syndicate with a flag.".
Costin Raiu
01:37:43
so, about ~3000
Juan Andres Guerrero-Saade
01:37:59
😂
Mariana Estela
01:38:07
1000 thousand AI robots to change a bulb.
Michael Molsner
01:44:13
Ishimaru-san, ieeeeei
JAEKI KIM
01:44:15
Thanks for Good Presentation +_+
Sveva Vittoria Scenarelli
01:44:40
Great presentation on ThreatNeedle, thank you for sharing your research and what you observed :)
Julio Canto
01:44:50
+1
Brian
01:44:52
Love listening to Suguru. Always a good time!
Norihiko Maeda
01:45:01
Ishimaru-san, cool!!
Vitaly
01:45:02
Maeda-san!!!
sojun ryu
01:45:20
Thank you for showing ThreatNeedle to us!
Brian
01:45:24
Is McConkey in here?
Brian
01:45:40
+1000 Dave
Vitaly
01:46:04
A41APT41
Brian
01:47:07
Oh it makes sense definitely
Norihiko Maeda
01:47:07
Vitaly-san~~~ :)
Vitaly
01:47:14
:) Many APTs are not real APTs too
Brian
01:47:15
Just confusing to see without context
Sveva Vittoria Scenarelli
01:50:47
@Brian, Kris told me to relay that he wishes he could have attended! Instead his analysts are here taking notes, sorry :')
Dave Aitel
01:51:29
this is a great slide
Dave Aitel
01:52:25
Thanks Brian!
Dave Aitel
01:52:50
Can we get a timeline of exploits used like that last slide?
Dave Aitel
01:53:15
interesting they use blind key exchange!
Dave Aitel
01:53:22
Is that normal for Chinese groups?
Dave Aitel
01:54:00
(Assuming I Read that last slide correctly)
Vitaly
01:54:41
Provocative export function name :)
Kaspersky Events
01:55:14
Please direct your Qs regarding the presentation to the Q&A box so we do not miss any of them :)
Dave Aitel
01:55:55
Do we ever see "stolen credentials" that would have been gotten only from SIGINT networks?
Dave Aitel
01:56:48
We say "Delete the eventlog" - do they do a full wipe or a selected entries delete?
Juan Andres Guerrero-Saade
01:57:19
Sounds like they yeet the logs.
Brian
01:57:30
Yeet!
Juan Andres Guerrero-Saade
01:58:43
I wonder how good the Lazarus group is at Starcraft2
Dave Aitel
01:59:31
That's a really good finding
Dave Aitel
01:59:36
and I wish it had a bullet-point on the slide
Dave Aitel
01:59:39
so we could share it more widely
Vitor Ventura
01:59:52
Its been a while since I've played StarCraft 2
Dan
01:59:54
"I wonder how good the Lazarus group is at Starcraft2" => they still play starcraft 1.04 for sure
Dave Aitel
01:59:55
(Real world attacker finding Kerberos hosts that are due to be decommissioned but hanve't yet)
Juan Andres Guerrero-Saade
02:00:48
SC1 is hardcore <.<
Kaspersky Events
02:00:59
Here is the link to the slide deck of the A41APT presentation: https://twitter.com/kaspersky/status/1364952544221495301
Brian
02:08:06
Sergio must be sooo happy right now :)
Maher Yamout
02:08:43
Diamond FTW
Motohiko
02:17:16
Yes, The attacker delete secutity logs for each works.
Brian
02:17:45
Great job! Thanks!
Aya Shinoda
02:17:58
Thanks for the very nice A41APT research results! Otsukare-sama!
Brian
02:18:04
Oh damn Vitality is on
Seongsu
02:18:19
Great presentation!
Brian
02:18:36
Dont disconnect!
Dan
02:18:47
No no, we love your IDA Pro kung-fu
Dave Aitel
02:18:48
I am deifinitely disconnecting
Vitor Ventura
02:19:05
midnight commander for the win :D
Dave Aitel
02:19:17
vmprotect is so annoying
Brian
02:19:22
What is he using to get this on the screen?
Dave Aitel
02:19:31
Can you unpack the riotgames valiant kernel module?
Dave Aitel
02:21:05
clicky clicky
Brian
02:22:45
@Anthony the video will be made available after ;)
Keld Rasmussen
02:23:57
What is the programs name here on the last section
Juan Andres Guerrero-Saade
02:24:27
Master Vitaly’s presentation magic is unparalleled
Juan Andres Guerrero-Saade
02:26:09
IDA TIME
Brian
02:28:56
@Keld, he’s using x64dbg (https://x64dbg.com/#start) which has Scylla built in if that’s what you were asking. Not sure if that was your question.
Keld Rasmussen
02:30:24
Thanks
Brian
02:31:49
Magic
Dan
02:33:03
Amazing
Brian
02:33:25
Ugg vmprotect
仲寬 陳
02:35:06
Is it possible to provide the samples, or the hashes, so that we can try by ourself? Thanks
Dan
02:44:16
I find it useful!
Brian
02:45:06
Super secret solution…Ask Vitaly to find a solution ;)
Juan Andres Guerrero-Saade
02:46:47
<3
Brian
02:46:50
Awesome job Master V
Shu En Liew
02:47:12
Thanks Vitaly
Andrei Nosatii
02:47:20
activate windows :))
Noushin Shabab
02:47:24
Amazing presentations everyone!
Brian
02:47:48
hahaha
Juan Andres Guerrero-Saade
02:49:20
Will you share the IDApython script?
Brian
02:49:57
Yes
Juan Andres Guerrero-Saade
02:49:59
Yes!
Brian
02:50:06
Bloggie awards!
Erwin Schrodinger
02:50:08
Yes please
jeff esposito
02:50:12
MOAR for Securelist
Suguru
02:50:15
+1
Negar Shabab
02:50:24
Awesome presentation! Thanks Vitaly!
仲寬 陳
02:50:27
Yes~ Thanks you !!!
Oleg Bil
02:50:49
Thank you, Vitaly! Great presentation!
Suguru
02:51:23
Awesome demo!
Brian
02:53:06
You told them to disconnect!
Juan Andres Guerrero-Saade
02:53:07
50 people don’t know IDA / x64dbg
Juan Andres Guerrero-Saade
02:53:33
Brian, when are we getting a BITTER / Moses report?
Shu En Liew
02:53:49
Thank you all speakers, good night
Milvio Falciatori
02:53:51
Thank you all for the awesome presentations!
Juan Andres Guerrero-Saade
02:53:54
Thanks guys!
Brian
02:53:55
This week / early next
Julio Canto
02:53:55
thanks for everything :)
Juan Andres Guerrero-Saade
02:53:59
<3
Erwin Schrodinger
02:54:02
Thanks!
Keld Rasmussen
02:54:03
thanks to you all
仲寬 陳
02:54:03
Thanks, great presantation!
Negar Shabab
02:54:04
Great talks! Great conference as always! Thanks Kaspersky :)
Peter Haag
02:54:10
thx!
Juan Andres Guerrero-Saade
02:54:14
I expect Dan to be dressed as the hamburgler for the US edition
Sergey
02:54:15
stay tuned for more rumours about Hybrid-SAS.... later this year
Suguru
02:54:17
Thank you guys!
Sergey
02:54:30
thanks everybody!
Motohiko
02:54:41
thank you!
Raphael Gerga
02:54:46
Thank you!
Sergey
02:54:46
respect to all the speakers!!!!
Vitaly
02:55:20
If you interested in Reversing Malware training we are launching one at xtraining.kaspersky.com later this year. Stay tuned!
Dan
02:55:46
Reversing Malware Training - YEEESSS
Dan
02:56:21
"I expect Dan to be dressed as the hamburgler for the US edition " => 1 BTC , downpayment