9:00 am - 10:00 am GMT 9:00 am - 10:00 am UTC | Live in London and Online Registration & Networking |
10:00 am - 10:15 am GMT 10:00 am - 10:15 am UTC | Live in London and Online Opening Remarks |
10:15 am - 10:55 am GMT 10:15 am - 10:55 am UTC | Live in London and Online Keynote: Session To Be Announced |
11:00 am - 11:30 am GMT 11:00 am - 11:30 am UTC | Live in London and Online Crisis Management - What Could Go Wrong? A human behavioural take on strategies and guidance, using insights and tales from the front line. Crisis management, crisis simulation, crisis response. These terms are currently being banded around somewhat interchangeably. There is a constant undercurrent of cyber incident related anxiety, for obvious reasons. Very few have visibility of what actually happens when a cyber crisis occurs, let alone how they should prepare themselves. Perhaps they have a run an annual mandatory IT team tabletop exercise for the IT team, or compulsory incident training. Conversely, Crisis Management simulations are hugely in demand from enterprise clients, but after initial conversations it becomes clear that this exercise may be to appease the board and tick a box, as opposed to truly exposing an organisation to the wide-scale chaos of a cyber crisis causing wide spread business impact. Very few clients know what a Crisis Management simulation might entail, let alone what they should be looking to achieve. There are some basic principles that will help an organisation be more resilient to this type of incident, and practical insights that can be shared from those who have seen it, warts and all. In order to address some of these problems, my presentation will cover the following key topics: • Leveraging communication strategies in a crisis • The importance and power of the human element in any crisis response efforts • How research and context are essential to prioritizing and coordinating your crisis response activities • Practical ways to ensure cyber crisis preparedness • Tales from the front line of some of the worlds largest cyber response efforts These points will be delivered, from a unique standpoint, in comparison to a typical cyber related presentation. So, who is this presentation for: • Internal or external technical or non-technical persons who are likely to be part of an organisations cyber crisis or incident response • Anyone who has seen the recent media frenzy around cyber security incidents, and wants real insight into what a crisis management effort constitutes and how it can be managed effectively In combining the psychological and human element, plus experience both my own and from industry experts, this presentation will offer a practical and insightful approach to those wishing to truly be prepared for a cyber crisis in the current climate.
Show More
|
11:30 am - 11:50 am GMT 11:30 am - 11:50 am UTC | Live in London and Online Networking Break |
11:50 am - 12:20 pm GMT 11:50 am - 12:20 pm UTC | Live in London and Online Everyone Gets a Web Shell! Or, Backdooring Web Hosting Companies in Scale What happened when a flying-under-the-radar threat actor decided to directly go after web-hosting providers who host thousands of legitimate websites? How and why did they do it? These questions stand at the heart of our talk, in which we’ll explore the evolution of a determined threat actor that has been targeting web hosting providers throughout 2020-2023. This group’s only documented campaign so far, was dubbed “Manic Menagerie” back in 2018, where the threat actor was focused mainly on conducting coin-mining and search engines optimization (SEO) activities. Our investigation revealed that the group has recently upgraded its toolset and shifted towards a far more dangerous and innovative attack scheme. While investigating incidents related to the group, a unique tool was identified. This custom-built tool’s purpose was to facilitate a mass-backdooring of legitimate websites hosted on the web hosting providers. Such malicious activity can potentially lead to a devastating impact affecting both web hosting companies and the websites that are stored on their servers, including unknowingly hosting command and control servers. In this talk, we will provide analysis of the custom-built backdooring tool that was used to compromise at least hundreds of websites, together with other selected tools from the attacker’s arsenal. In addition, we will share our threat hunting methodology that led to this discovery, starting with the initial anomalous behavioral findings that kicked off our long investigative journey. We shall share our challenges with big-data hunting, how to effectively conduct an investigation on nearly three years worth of data, and how we dealt with certain research gaps. By the end of the talk the audience will be acquitted with previously undiscovered custom tools, the modus-operandi of a rarely seen threat actor, and of course actionable intelligence on how to hunt for similar threats.
Show More
|
12:25 pm - 12:50 pm GMT 12:25 pm - 12:50 pm UTC | Live in London and Online Session To Be Announced |
12:55 pm - 1:15 pm GMT 12:55 pm - 1:15 pm UTC | Live in London and Online Supporting Victims of Cybercrime and Online Harm The Cyber Helpline is a UK charity that supports over 2000 victims of cybercrime every month by linking them with cybersecurity experts for free, expert help. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from 'traditional' cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn't always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your experience to make a difference in peoples lives with the skills you already have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities to support victims of cybercrime and online harm.
Show More
|
1:15 pm - 2:15 pm GMT 1:15 pm - 2:15 pm UTC | Live in London and Online Networking Lunch |
2:15 pm - 2:40 pm GMT 2:15 pm - 2:40 pm UTC | Live in London and Online BYOVD (Bring Your Own Vulnerable Driver): The Adversaries Return to the Kernel Paul Moon, Senior Manager Technical Analysis Cell, CrowdStrike Despite Microsoft’s efforts to increase mitigation within the Windows Kernel the adversaries' access is on the rise. One reason for this increase is the widespread use of the BYOVD technique, where legitimate but vulnerable drivers are exploited to gain access at ring0. This technique enables the adversary to perform sensor tampering, disable driver signing, install bootkits and allow them to evade detection. This talk covers real world examples of this trend, digs into observed techniques in practice, discusses the difficulties in defending BYOVD and provides you with suggested mitigations including what to look out for.
The following are key take aways of this talk: - The trend for BYOVD incidents is on the increase and what this means for your defensive posture
- Which adversaries are using this technique and how are they using it.
- What makes this threat challenging to detect.
- What are the best mitigation strategies to prevent this threat.
Show More
|
2:45 pm - 3:10 pm GMT 2:45 pm - 3:10 pm UTC | Live in London and Online Behind the Scenes: A Look at Iran's Contracting Landscape Saher Naumaan, Principal Threat Intelligence Analyst, BAE Systems Digital Intelligence Molly Elliott, Threat Intelligence Analyst, BAE Systems Digital Intelligence Both of the main security agencies in Iran - the Islamic Revolutionary Guard Corps and the Ministry of Intelligence and Security - use private companies and individual contractors for malware development, operational activity, and support/training. Using recent and historical examples, we will discuss how researchers have linked companies and individuals back to threat groups (and security agencies) through OSINT and technical links, and outline the types of services contractors likely provide to Iran's government. These are comprised of a range of different activities, including espionage, cyber-enabled influence, and disruptive operations. This talk identifies ongoing trends and remaining areas of uncertainty when it comes to Iran's contracting landscape, including contractors' remits, tactics, and relationships to the government. We explore questions about the talent pools used to build Iran's contractors, the comparisons with other countries' contracting models, how Western sanctions and indictments have addressed these third-party companies, and how they have informed the UK and US's policies towards Iran.
Show More
|
3:15 pm - 3:45 pm GMT 3:15 pm - 3:45 pm UTC | Live in London and Online Analyzing Volatile Memory on a Google Kubernetes Engine Node My talk focuses on how we can access and analyze volatile memory in the kernel on a Google Kubernetes Engine (GKE) node using AVML. The purpose of this is to collect a memory snapshot to get granular information about running processes and activities on the GKE node as well as pods and containers running on that node. By using the memory snapshot we can troubleshoot current node activities or use it to collect additional information as part of a security investigation. I will also cover how this method is applicable to other cloud instances running Linux distributions that are supported by AVML. In my talk I will show how we can: - Build a custom privileged docker container running AVML.
- Deploy it to a specific GKE node we want to take a memory snapshot of.
- Access the kernel space on the GKE node in /proc/kcore and take a snapshot of it.
- Get a copy of the unencrypted vmlinux file for the active running version of the GKE node.
- Build an intermediate symbol file (ISF) of the kernel using dwarf2json to analyze the memory dump using the vmlinux file.
- Provide methods for how to analyze the snapshot, using for example Volatility3.
Show More
|
3:45 pm - 4:10 pm GMT 3:45 pm - 4:10 pm UTC | Live in London and Online Networking Break |
4:10 pm - 4:35 pm GMT 4:10 pm - 4:35 pm UTC | Live in London and Online Beyond Sophistication: Leveraging Threat Actor Attributes to Improve Security Outcomes Jamie Collier, Senior Threat Intelligence Advisor, Mandiant Intelligence, Google Cloud Sophistication is a misleading descriptor for threat actors and has become amorphous in the various ways it is used. This talk proposes a more precise discussion of adversaries’ attributes to meaningfully differentiate between threats. Our central argument will be that adopting a richer vocabulary of descriptors offers far more than just nuanced understanding. Rather, our focus will be on the way that focusing on actor attributes can improve security outcomes. We do this by demonstrating how actor attributes can enable threat intelligence to be applied more effectively to wider range of use cases beyond the security operation centre. Here, we will focus on how adversary attributes can be used to improve threat-led red teaming and cyber risk assessments. Part 1: Intro speakers and central argument Part 2: Outline why sophistication and other related terms such as APT are limited terms + explain why they fall short. Some of the content discussed here will build on this article I wrote (https://www.collierjam.com/untitled-4/) Part 3: Outline a collection of more precise descriptors and explore some as examples (i.e. stealthy, brazen, clumsy, tailored, pragmatic, etc.). Part 4: Outline how the use of these more precise terms can better inform a) red teaming and b) cyber-risk. This talk will build off previous work on the topic, such as Juan-Andres Guerrero Saade's 2018 Virus Bulletin paper (https://www.virusbulletin.com/blog/2019/01/vb2018-paper-draw-me-one-your-french-apts-expanding-our-descriptive-palette-cyber-threat-actors/). A lot of the added value of this paper is to focus the discussion on the pragmatic benefits of using more precise descriptors as well as offer practical advice on how this can be applied to various threat intel use cases.
Show More
|
4:40 pm - 5:10 pm GMT 4:40 pm - 5:10 pm UTC | Live in London and Online The Certificate Enrollment Agent's Underestimated Superpower In Microsoft's Compromise Recovery team we fight cyber attacks besides our customers almost every day. Our work includes different technologies, but Active Directory is our main focus in most cases as it is still an attractive target for attackers. Active Directory has a long history with certificate-based authentication, with smart card authentication being the most widely known use case. Having some technical knowledge of certificate-based authentication in Active Directory allows to correctly assess the sensitivity of a Certification Authority's private key for Active Directory security. Unexpectedly, not only Certification Authorities are entitled of verifying incoming certificate requests, in some cases this sensitive task is delegated to a role called "Certificate Enrollment Agent". A (Certificate) Enrollment Agent is a user who can enroll for a certificate on behalf on another client or user. The permission to do so is based on the requirement of a digital counter-signature with an Enrollment Agent certificate. In other words, a counter-signature from an entitled Enrollment Agent will result in a certificate issued by the Certification Authority. This session will deal with the Certificate Request Agent's superpower, how it can be abused during attacks and how to protect.
Show More
|
5:10 pm - 5:20 pm GMT 5:10 pm - 5:20 pm UTC | Live in London and Online Closing Remarks |
5:20 pm - 6:30 pm GMT 5:20 pm - 6:30 pm UTC | Live in London and Online Networking & Drinks |