BlackHat USA 2011

“Men’s minds have difficulty adapting to things with which they have no experience.”

Almost 10,000 security pros, hackers and interested folks gathered at BlackHat USA this morning at Caesar’s Palace in Las Vegas. The morning began with a keynote talk from 28 year CIA counter-terrorism veteran, Ambassador Cofer Black, comparing the evolution of past global conflict with the evolution of the world of cyber-security.

Black related his past experiences and difficulties in fighting terrorist organizations around the world with experiences and difficulties that security pros currently have fighting cyber-attackers around the world.

One of his most alarming statements, and one which has been discussed thoroughly by Kaspersky Lab researchers and speakers, was “Stuxnet is the rubicon of our future”.

Blackhat 2011

He outlined the significance of the attack: it was a very expensive effort, that our virtual world of cyberattacks had morphed into the physical destruction of a national resource, and that it forced nations to rethink what the potential response would be for something like this. He repeated that these all have huge impacts on our lives, along with the expectations and needs for cyber security in our lives.

And with that, a slew of talented security researchers present their work over the next two days. We will update this blog with thoughts from some of the sessions here. Right now, I am sitting in on an analysis of Google’s replacement for HTTP, otherwise known as SPDY.

Ambassador Cofer Black Keynote

BlackHat USA 2011

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox