Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Intel Analysis of Ukrainians Power Grid Hack
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Indicators of Compromise
- 3 Pyramid of Pain
- 4 Tools Used
- 5 The Incident
- 6 Why
- 7 ICS
- 8 HMI
- 9 Tools
- 10 KillDisk
- 11 IP Address
- 12 Proxy Server
- 13 ICS Kill Chain
- 14 Stage 1 Microsoft Office
- 15 Stage 2 Spearfishing
- 16 BlackEnergy Installer
- 17 Driver
- 18 Main DLL
- 19 Stealing Files
- 20 Firmware Development
- 21 Attack
- 22 Sandworm
- 23 Why Ukraine
- 24 Timeline
- 25 Similarities
- 26 How can we solve that
- 27 Other vectors
- 28 The sleeper must awaken
- 29 Another pyramid
- 30 Power Grid Policies
- 31 Security Gap
- 32 Summary
- 33 Questions