IG: @ElfGrumpo
Twitter: @ElfGrumpo
For my first cybersecurity case study, I wanted to examine the Maersk attack, the most financially devastating hack to date causing up to an estimated 10 billion dollars worth in damages using the extremely interesting NotPetya Malware. In this series, we'll investigate the motivations behind unleashing NotPetya, the symptoms the malware expressed, the damage the malware caused, as well as an analytical look at the malware itself.
I've wanted to try out a case study on my channel for a while now, and I'm super excited to release this!
Sources:
Wired Article: https://webcache.googleusercontent.com/search?q=cache:OL8FjTah8T4J:https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/+&cd=1&hl=en&ct=clnk&gl=us
Technical Analysis (Logrhythm): https://logrhythm.com/blog/notpetya-technical-analysis/
Carbon Black: https://blogs.vmware.com/security/2017/06/carbon-black-threat-research-technical-analysis-petya-notpetya-ransomware.html
Varonis: https://www.varonis.com/blog/what-is-mimikatz/
Wired (Mimikatz): https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/?_ga=2.187623981.404285471.1624554274-1702173853.1624554274
Twitter: @ElfGrumpo
For my first cybersecurity case study, I wanted to examine the Maersk attack, the most financially devastating hack to date causing up to an estimated 10 billion dollars worth in damages using the extremely interesting NotPetya Malware. In this series, we'll investigate the motivations behind unleashing NotPetya, the symptoms the malware expressed, the damage the malware caused, as well as an analytical look at the malware itself.
I've wanted to try out a case study on my channel for a while now, and I'm super excited to release this!
Sources:
Wired Article: https://webcache.googleusercontent.com/search?q=cache:OL8FjTah8T4J:https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/+&cd=1&hl=en&ct=clnk&gl=us
Technical Analysis (Logrhythm): https://logrhythm.com/blog/notpetya-technical-analysis/
Carbon Black: https://blogs.vmware.com/security/2017/06/carbon-black-threat-research-technical-analysis-petya-notpetya-ransomware.html
Varonis: https://www.varonis.com/blog/what-is-mimikatz/
Wired (Mimikatz): https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/?_ga=2.187623981.404285471.1624554274-1702173853.1624554274
- Category
- MILITARY
Commenting disabled.