Hot Topic in Icy Country

These days Passwords^12 is taking place in Oslo – a conference only dedicated to passwords and pin codes. With temperatures around -15 degrees (celsius) outside, in the conference rooms of the University in Oslo, Department of Informatics, talks by well known security expert are given.

Every day you use passwords. While logging on to your computer, smartphone or tablet, accessing your emails or your social network site and also for online banking and online shopping. Recent database breaches of user logins show that there is a high demand for more security in this area. During these days talks and discussions only care about this.

Norbert Schmitz started with a presentation about his master thesis on sentences and word-combinations used for password guessing. He developed algorithms for pattern learning and creating dictionaries. Followed by Joan Daemen, co-inventor of Rijndael (AES crypto algorithm) and KECCAK (winner of the SHA-3 hash algorithm competition), with an insight on this recent algorithm.

Markus Duermuth presented research on the use of Markov models used in password guessing (pre work, with different approach by Arvind Narayanan and Vitaly Shmatikov “Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff”). Bitweasil presented recent changes on his cryptohaze architecture. Most important is the new modular design which is easier to extend and an additional network layer for distributed processing. Sebastian Raveau gave a talk on hunting for passwords and his troubles while compiling wordlists out of Wikipedia. Besides different languages and filtering trash, mostly Wikipedia’s XML-scheme and changing syntax makes his work hard. He will soon release his new compiled wordlist to the public. The last session was a presentation by Prof. Audun Jsang about password policies in different countries.

The end of the official part doesn’t mean an end at all. Lightning talks are following and discussions are going on. One very impressive lightning talk was the presentation by Jeremi M Gosney about HPC (High performance computing), distributing workload to several GPUs in several systems.

More interesting talks will also be given next days. (please have a look at the Agenda for more)

Hot Topic in Icy Country

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox