Overview
Explore the critical security insights gleaned from the Mueller Report in this 21-minute conference talk by Arkadiy Tetelman at BSidesSF 2020. Delve into the forensic evidence surrounding the DNC and DCCC compromises, examining how access was gained, networks were traversed, and what organizations can do to enhance their defenses. Learn about phishing tactics, stolen data, GRU structure, and pivoting techniques used in the attacks. Gain valuable recommendations for endpoint monitoring and overall security improvements to protect against similar threats.
Syllabus
Introduction
Agenda
Timeline
Cost
The Report
Blue Team Learnings
Phishing Email
Overall fished accounts
What can you do
Pivot Recommendations
Additional DNC Compromises
Tools Used
Stolen Data
GRU Structure
GRU 7455
Recommendations
Endpoint Monitoring
Overall conclusions
Taught by
Security BSides San Francisco