All language subtitles for 003 Adversary Emulation (OBJ 1.2)

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese Download
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,360 --> 00:00:01,980 -: When you're conducting an engagement 2 00:00:01,980 --> 00:00:05,820 sometimes you might be asked to perform adversary emulation. 3 00:00:05,820 --> 00:00:08,340 Now, adversary emulation is a specialized type 4 00:00:08,340 --> 00:00:10,290 of penetration testing where you're trying to 5 00:00:10,290 --> 00:00:12,501 mimic the tactics, techniques, and procedures 6 00:00:12,501 --> 00:00:16,500 of a real world threat actor during your penetration test. 7 00:00:16,500 --> 00:00:19,260 For example, maybe you're conducting a penetration test 8 00:00:19,260 --> 00:00:21,750 against a defense contracting firm that's responsible 9 00:00:21,750 --> 00:00:23,190 for writing the software code that's used 10 00:00:23,190 --> 00:00:24,840 by military aircraft. 11 00:00:24,840 --> 00:00:26,100 That firm might be concerned 12 00:00:26,100 --> 00:00:28,140 with the possibility of a data exfiltration 13 00:00:28,140 --> 00:00:31,530 of their proprietary source code from a nation state actor. 14 00:00:31,530 --> 00:00:34,980 Now, for example, APT25 is believed by experts 15 00:00:34,980 --> 00:00:37,320 to have been attributed to Chinese nation state 16 00:00:37,320 --> 00:00:40,650 actors who target the defense industrial basis contractors 17 00:00:40,650 --> 00:00:42,690 in the United States and over in Europe, 18 00:00:42,690 --> 00:00:44,880 with the goal of conducting data exfiltration 19 00:00:44,880 --> 00:00:47,370 and theft of their trade secrets. 20 00:00:47,370 --> 00:00:49,710 Now, if you're asked to emulate this threat actor, 21 00:00:49,710 --> 00:00:52,020 you would then need to use spearfishing messages 22 00:00:52,020 --> 00:00:54,780 that include malicious attachments or malicious hyperlinks 23 00:00:54,780 --> 00:00:56,610 because that is one of the common tactics, 24 00:00:56,610 --> 00:00:58,440 techniques, and procedures that are used 25 00:00:58,440 --> 00:01:00,840 by this particular threat actor who is characterized 26 00:01:00,840 --> 00:01:03,273 as an advanced persistent threat or APT. 27 00:01:04,230 --> 00:01:07,200 Now, a threat actor is really just a generic term, 28 00:01:07,200 --> 00:01:09,030 and we use this to describe the bad folks 29 00:01:09,030 --> 00:01:10,440 out there who wanna do harm 30 00:01:10,440 --> 00:01:13,110 to our networks or steal our secure data. 31 00:01:13,110 --> 00:01:16,740 Put simply, a threat actor is an unauthorized hacker. 32 00:01:16,740 --> 00:01:19,680 However, not all threat actors are created equal, 33 00:01:19,680 --> 00:01:21,690 so there's different categories or tiers 34 00:01:21,690 --> 00:01:23,220 of adversaries out there. 35 00:01:23,220 --> 00:01:25,530 Some are structured, some are unstructured, 36 00:01:25,530 --> 00:01:27,090 some are more skilled than others, 37 00:01:27,090 --> 00:01:29,010 and there's many different things that motivate 38 00:01:29,010 --> 00:01:30,840 each type of threat actor. 39 00:01:30,840 --> 00:01:33,720 Now we're gonna look at six main types of threat actors: 40 00:01:33,720 --> 00:01:36,930 script kiddie, insider threat, competitor, 41 00:01:36,930 --> 00:01:41,460 organized crime, hacktivist, and a nation state or APT. 42 00:01:41,460 --> 00:01:44,220 The first type of threat actor is called a script kiddie. 43 00:01:44,220 --> 00:01:46,500 This is the least skilled type of attacker. 44 00:01:46,500 --> 00:01:48,182 Now, a script kiddie tends to use other people's 45 00:01:48,182 --> 00:01:50,190 tools to conduct their attacks, 46 00:01:50,190 --> 00:01:52,410 and they don't have the skills to develop their own tools, 47 00:01:52,410 --> 00:01:54,420 like more advanced attackers might. 48 00:01:54,420 --> 00:01:57,870 Instead, a script kiddie uses freely available tools found 49 00:01:57,870 --> 00:02:00,750 on the internet or an openly available security tool sets 50 00:02:00,750 --> 00:02:03,300 that a penetration testers might also use. 51 00:02:03,300 --> 00:02:06,240 This includes things like Metasploit, Aircrack-NG, 52 00:02:06,240 --> 00:02:08,610 John the Ripper, and many others they can use to 53 00:02:08,610 --> 00:02:10,050 conduct their attacks. 54 00:02:10,050 --> 00:02:12,360 Using these freely available vulnerability assessment 55 00:02:12,360 --> 00:02:14,910 and hacking tools, these script kiddies can conduct their 56 00:02:14,910 --> 00:02:18,720 attacks for profit, to gain credibility, or just for fun. 57 00:02:18,720 --> 00:02:20,910 For example, there's a program out there called 58 00:02:20,910 --> 00:02:22,740 Low Orbit Ion Canon. 59 00:02:22,740 --> 00:02:24,540 This is a simple program that's often used 60 00:02:24,540 --> 00:02:27,690 by script kiddies to conduct a denial of service attack. 61 00:02:27,690 --> 00:02:30,060 The script kiddies will simply enter in a URL 62 00:02:30,060 --> 00:02:32,250 or an IP address into the input box 63 00:02:32,250 --> 00:02:34,057 and click the button labeled go. 64 00:02:34,057 --> 00:02:36,588 Immediately, a barage of traffic begins to flood 65 00:02:36,588 --> 00:02:39,840 the victim system to attempt a denial of service. 66 00:02:39,840 --> 00:02:41,130 It's just that simple. 67 00:02:41,130 --> 00:02:43,860 There's no skill or underlying knowledge required. 68 00:02:43,860 --> 00:02:46,740 They simply plug in a website address and hit go. 69 00:02:46,740 --> 00:02:49,080 Now, script kiddies often don't even understand the tools 70 00:02:49,080 --> 00:02:51,270 they're using and the damage that can cause, 71 00:02:51,270 --> 00:02:53,400 or even what those actions are performing. 72 00:02:53,400 --> 00:02:56,370 That being said, these script kiddies can still use simple 73 00:02:56,370 --> 00:02:58,530 tools to create some really undesirable effects 74 00:02:58,530 --> 00:03:00,176 to your organization's network. 75 00:03:00,176 --> 00:03:02,250 The second type of threat actor we have 76 00:03:02,250 --> 00:03:04,230 is known as an insider threat. 77 00:03:04,230 --> 00:03:05,910 An insider threat is an employee 78 00:03:05,910 --> 00:03:07,860 or former employee who has knowledge 79 00:03:07,860 --> 00:03:10,890 of the organization's network, policies, procedures, 80 00:03:10,890 --> 00:03:12,540 and business practices. 81 00:03:12,540 --> 00:03:14,580 The insider threat is one of the most dangerous 82 00:03:14,580 --> 00:03:16,980 for an organization, because these people usually 83 00:03:16,980 --> 00:03:19,170 have authorized access to the network already, 84 00:03:19,170 --> 00:03:22,170 making them both dangerous and difficult to find. 85 00:03:22,170 --> 00:03:24,990 An insider threat could be either skilled or unskilled, 86 00:03:24,990 --> 00:03:26,670 depending on who they are. 87 00:03:26,670 --> 00:03:29,070 For example, an unskilled insider might 88 00:03:29,070 --> 00:03:31,590 copy the organization's files onto a thumb drive, 89 00:03:31,590 --> 00:03:33,690 and then walk out the front door with them. 90 00:03:33,690 --> 00:03:36,240 Even though they were authorized to access those files, 91 00:03:36,240 --> 00:03:37,860 they were not authorized to remove them 92 00:03:37,860 --> 00:03:39,840 from the network or post them online, 93 00:03:39,840 --> 00:03:42,810 which then results in a data breach for your organization. 94 00:03:42,810 --> 00:03:45,300 Or you may have a very skilled insider threat 95 00:03:45,300 --> 00:03:48,030 who's able to elevate their own user account permissions 96 00:03:48,030 --> 00:03:50,820 so that they can access data from across the entire network 97 00:03:50,820 --> 00:03:53,070 and then try to sell it to a willing buyer. 98 00:03:53,070 --> 00:03:54,750 To prevent the insider threat, 99 00:03:54,750 --> 00:03:56,640 organizations need to put policies 100 00:03:56,640 --> 00:03:58,800 and enforcement technologies into place, 101 00:03:58,800 --> 00:04:01,350 such as data loss prevention to detect these insiders 102 00:04:01,350 --> 00:04:03,840 who are attempting to remove the data from the network. 103 00:04:03,840 --> 00:04:06,843 Also, all of the organization's standard internal defenses 104 00:04:06,843 --> 00:04:08,451 need to be properly configured 105 00:04:08,451 --> 00:04:10,560 and cybersecurity analysts must search 106 00:04:10,560 --> 00:04:11,880 through the security information 107 00:04:11,880 --> 00:04:14,490 and event management systems to identify any patterns 108 00:04:14,490 --> 00:04:17,940 of abuse in order to catch the malicious insider. 109 00:04:17,940 --> 00:04:20,850 The third type of threat actor we have is a competitor. 110 00:04:20,850 --> 00:04:23,370 Now, a competitor is a rogue business that attempts to 111 00:04:23,370 --> 00:04:26,580 conduct cyber espionage against your organization. 112 00:04:26,580 --> 00:04:29,400 Competitors are focused on stealing your proprietary data, 113 00:04:29,400 --> 00:04:32,640 disrupting your business, or damaging your reputation. 114 00:04:32,640 --> 00:04:34,950 Often competitors will seek to use an employee 115 00:04:34,950 --> 00:04:35,970 as an insider threat 116 00:04:35,970 --> 00:04:39,000 inside your organization to steal the data from you. 117 00:04:39,000 --> 00:04:40,590 Or they may attempt to break 118 00:04:40,590 --> 00:04:43,230 into your network over the internet themselves. 119 00:04:43,230 --> 00:04:45,720 The fourth type of threat actor we have is categorized 120 00:04:45,720 --> 00:04:47,460 as organized crime. 121 00:04:47,460 --> 00:04:49,200 Now, organized crime is a category 122 00:04:49,200 --> 00:04:51,240 of threat actor who's focused on hacking 123 00:04:51,240 --> 00:04:54,690 and computer fraud in order to receive financial gain. 124 00:04:54,690 --> 00:04:56,106 Due to the internet's wide reach, 125 00:04:56,106 --> 00:04:58,950 a criminal in one part of the world can hack the computer 126 00:04:58,950 --> 00:05:00,510 of somebody on the other side of the globe 127 00:05:00,510 --> 00:05:02,130 with ease and within seconds. 128 00:05:02,130 --> 00:05:05,160 Oganized crime gangs often run different schemes 129 00:05:05,160 --> 00:05:07,320 or scams using social engineering, 130 00:05:07,320 --> 00:05:09,870 or conduct more technical attacks using ransomware 131 00:05:09,870 --> 00:05:12,300 in order to steal money from their victims. 132 00:05:12,300 --> 00:05:14,580 Organized crime hackers tend to be well funded, 133 00:05:14,580 --> 00:05:17,280 and they use sophisticated attacks and tools. 134 00:05:17,280 --> 00:05:20,248 The fifth type of threat actor is known as a hacktivist. 135 00:05:20,248 --> 00:05:23,100 Hacktivists tend to be comprised of politically motivated 136 00:05:23,100 --> 00:05:25,830 hackers who target governments, corporations, 137 00:05:25,830 --> 00:05:27,690 and individuals to advance their own 138 00:05:27,690 --> 00:05:30,060 political ideologies or agendas. 139 00:05:30,060 --> 00:05:32,610 For instance, an environmentalist might be considered 140 00:05:32,610 --> 00:05:35,220 a hacktivist if they hack into a logging company 141 00:05:35,220 --> 00:05:37,620 because they wanna see that company's stock prices fall 142 00:05:37,620 --> 00:05:39,480 in an effort to drive them outta business, 143 00:05:39,480 --> 00:05:42,030 and thereby they could save the forest. 144 00:05:42,030 --> 00:05:44,760 Hacktivists can be individuals or large groups. 145 00:05:44,760 --> 00:05:47,820 For example, Anonymous is a very large and well known 146 00:05:47,820 --> 00:05:50,490 hacktivist group. Hacktivists tend to vary in levels 147 00:05:50,490 --> 00:05:54,180 of organization from loosely organized to highly structured. 148 00:05:54,180 --> 00:05:55,980 And they can have a high level of sophistication 149 00:05:55,980 --> 00:05:58,380 in their attacks, or they can be very low. 150 00:05:58,380 --> 00:05:59,910 It really does depend. 151 00:05:59,910 --> 00:06:03,240 Often though, these hacktivists tend not to be well funded. 152 00:06:03,240 --> 00:06:05,190 The sixth type of threat actor is known as 153 00:06:05,190 --> 00:06:07,200 a nation state or APT. 154 00:06:07,200 --> 00:06:10,290 Now, an APT is an advanced persistent threat. 155 00:06:10,290 --> 00:06:12,180 Now, an APT is the most skilled type 156 00:06:12,180 --> 00:06:14,280 of threat actor that you're going to encounter. 157 00:06:14,280 --> 00:06:17,100 This is a group of attackers with exceptional capability, 158 00:06:17,100 --> 00:06:19,590 funding, and organization, who have an intent to 159 00:06:19,590 --> 00:06:21,990 hack a particular network or system. 160 00:06:21,990 --> 00:06:24,180 Nation states don't simply pick any network 161 00:06:24,180 --> 00:06:25,440 at random to attack, 162 00:06:25,440 --> 00:06:27,960 but instead they determine specific targets to 163 00:06:27,960 --> 00:06:29,850 achieve their political motives. 164 00:06:29,850 --> 00:06:31,920 These incredibly organized team of hackers 165 00:06:31,920 --> 00:06:35,550 conduct highly covert attacks over long periods of time. 166 00:06:35,550 --> 00:06:37,920 In fact, on average, an APT is 167 00:06:37,920 --> 00:06:40,740 in a victimized network for six to nine months 168 00:06:40,740 --> 00:06:43,620 before network defenders actually discover the intrusion. 169 00:06:43,620 --> 00:06:46,470 And some have gone several years between the breach 170 00:06:46,470 --> 00:06:48,870 and their eventual discovery by defenders. 171 00:06:48,870 --> 00:06:51,450 Nation state actors are extremely good at what they do 172 00:06:51,450 --> 00:06:53,880 and they're very difficult to find in a network. 173 00:06:53,880 --> 00:06:55,834 Over the years, many nation states have also 174 00:06:55,834 --> 00:06:58,380 supported various threat actors that pose 175 00:06:58,380 --> 00:07:00,405 as hacktivists or organized crime groups too, 176 00:07:00,405 --> 00:07:02,610 to maintain a plausible deniability 177 00:07:02,610 --> 00:07:04,350 for the hacks they're conducting. 178 00:07:04,350 --> 00:07:06,870 Other times, a nation state might use TTPs 179 00:07:06,870 --> 00:07:08,220 of a different nation state 180 00:07:08,220 --> 00:07:10,530 in order to implicate them in the attack. 181 00:07:10,530 --> 00:07:13,680 When this happens, it's known as a false flag attack. 182 00:07:13,680 --> 00:07:17,430 For example, back in 2015, a French TV network known as 183 00:07:17,430 --> 00:07:20,130 TV Five Monde, was taken off the air by 184 00:07:20,130 --> 00:07:22,200 a sophisticated cyber attack. 185 00:07:22,200 --> 00:07:23,910 The network's website was also defaced 186 00:07:23,910 --> 00:07:26,610 by a group calling itself the Cyber Caliphate 187 00:07:26,610 --> 00:07:29,520 and made to look like it was launched by the Islamic state. 188 00:07:29,520 --> 00:07:31,110 When security investigators actually looked 189 00:07:31,110 --> 00:07:33,240 into the attack though, they found the attack 190 00:07:33,240 --> 00:07:35,520 was actually Russian in origin, because the code 191 00:07:35,520 --> 00:07:38,280 used in the attack was typed using a cyrillic keyboard 192 00:07:38,280 --> 00:07:41,760 during normal working hours in Moscow in St. Petersburg. 193 00:07:41,760 --> 00:07:44,220 If this was accurate, then this means a Russian 194 00:07:44,220 --> 00:07:46,170 nation state actor was trying to appear 195 00:07:46,170 --> 00:07:48,510 as an Islamic state actor, so they would be blamed 196 00:07:48,510 --> 00:07:51,780 for the attack making this a false flag attack. 197 00:07:51,780 --> 00:07:53,887 Now, each threat actor also conducts these attacks 198 00:07:53,887 --> 00:07:57,330 for different reasons and are motivated by different things. 199 00:07:57,330 --> 00:07:59,160 This might be for greed or money, 200 00:07:59,160 --> 00:08:01,140 like crimeware and ransomware. 201 00:08:01,140 --> 00:08:04,170 Or it might be for power, revenge, or blackmail, 202 00:08:04,170 --> 00:08:06,600 such as in the case of an insider threat. 203 00:08:06,600 --> 00:08:09,120 For a script kiddie, it might just be for thrills, 204 00:08:09,120 --> 00:08:11,580 increased reputation, or some kind of recognition 205 00:08:11,580 --> 00:08:13,140 from fellow hackers. 206 00:08:13,140 --> 00:08:16,020 An APT, though, might hack for intelligence that they 207 00:08:16,020 --> 00:08:18,360 can gain this as a form of espionage to further 208 00:08:18,360 --> 00:08:20,280 their nation's political agendas. 209 00:08:20,280 --> 00:08:22,980 By keeping these motivations in mind, an organization 210 00:08:22,980 --> 00:08:26,220 can build better defenses against each type of threat actor. 211 00:08:26,220 --> 00:08:28,920 So, why is it important to consider the different types 212 00:08:28,920 --> 00:08:30,150 of threat actors? 213 00:08:30,150 --> 00:08:33,120 Well, as a penetration tester, you can use your knowledge 214 00:08:33,120 --> 00:08:34,740 of these threat actors to conduct 215 00:08:34,740 --> 00:08:36,870 threat modeling and emulation. 216 00:08:36,870 --> 00:08:38,940 Depending on the objectives of the engagement, 217 00:08:38,940 --> 00:08:41,490 you may be told to simulate an attack by a script kiddie, 218 00:08:41,490 --> 00:08:45,060 a hacktivist, an insider threat, or even an APT. 219 00:08:45,060 --> 00:08:47,250 Depending on which archetype we're emulating 220 00:08:47,250 --> 00:08:50,220 we're gonna model our techniques after that threat actor. 221 00:08:50,220 --> 00:08:53,430 For example, if you're asked to simulate an APT attack, 222 00:08:53,430 --> 00:08:54,690 you're gonna have to develop your own 223 00:08:54,690 --> 00:08:57,091 custom codes and exploits, which takes a lot 224 00:08:57,091 --> 00:08:58,590 more time and effort. 225 00:08:58,590 --> 00:09:00,150 This is gonna require a higher cost to 226 00:09:00,150 --> 00:09:01,620 conduct that assessment. 227 00:09:01,620 --> 00:09:02,640 On the other hand, 228 00:09:02,640 --> 00:09:04,350 if you're asked to emulate a script kiddie, 229 00:09:04,350 --> 00:09:06,180 you can simply use open source tools to 230 00:09:06,180 --> 00:09:07,680 conduct your attacks. 231 00:09:07,680 --> 00:09:09,780 Modeling an insider threat would require some 232 00:09:09,780 --> 00:09:12,420 insider knowledge, such as a username and password 233 00:09:12,420 --> 00:09:13,800 of an authenticated user 234 00:09:13,800 --> 00:09:15,810 or other information that somebody would know 235 00:09:15,810 --> 00:09:18,270 as part of a known environment assessment. 236 00:09:18,270 --> 00:09:20,640 Now, these are all factors to consider during your planning 237 00:09:20,640 --> 00:09:22,920 and scoping phase of your engagement. 238 00:09:22,920 --> 00:09:24,930 In the industry, we like to categorize 239 00:09:24,930 --> 00:09:26,970 these different threat actors into tiers, 240 00:09:26,970 --> 00:09:30,390 and we call them tier one going up to tier six. 241 00:09:30,390 --> 00:09:32,790 Now, tier one is for people who have little money, 242 00:09:32,790 --> 00:09:35,130 and rely on off-the-shelf tools and exploits. 243 00:09:35,130 --> 00:09:37,590 You guessed it, these are your script kiddies. 244 00:09:37,590 --> 00:09:38,857 Next we have tier two. 245 00:09:38,857 --> 00:09:41,670 This is people who have little money, but they've invested 246 00:09:41,670 --> 00:09:44,160 in their own tools against known vulnerabilities 247 00:09:44,160 --> 00:09:46,710 and this includes hacktivists, like Anonymous. 248 00:09:46,710 --> 00:09:49,170 Tier three actors tend to invest a lot of money 249 00:09:49,170 --> 00:09:52,050 to find unknown vulnerabilities in order to make a profit, 250 00:09:52,050 --> 00:09:55,380 and this includes criminal hackers who create ransomware. 251 00:09:55,380 --> 00:09:58,440 At tier four, we find organized, highly technical, 252 00:09:58,440 --> 00:10:00,960 proficient, and well-funded hackers who are working 253 00:10:00,960 --> 00:10:02,820 in teams to develop new exploits, 254 00:10:02,820 --> 00:10:04,950 and this includes some terrorist groups. 255 00:10:04,950 --> 00:10:07,470 Tier five includes nation states who are investing 256 00:10:07,470 --> 00:10:10,050 lots of money to create vulnerabilities and exploits, 257 00:10:10,050 --> 00:10:12,030 and these are your low end APTs, 258 00:10:12,030 --> 00:10:14,310 and these are gonna be some people who are state sponsored 259 00:10:14,310 --> 00:10:17,040 but maybe not working directly for the state. 260 00:10:17,040 --> 00:10:19,680 And finally, we have tier six, which is comprised 261 00:10:19,680 --> 00:10:22,320 of nation state actors investing even more money 262 00:10:22,320 --> 00:10:24,480 to carry out cyber attacks and military 263 00:10:24,480 --> 00:10:27,120 and intelligence operations that achieve political, 264 00:10:27,120 --> 00:10:29,220 military, and economic goals. 265 00:10:29,220 --> 00:10:30,780 This tier tends to be exclusive 266 00:10:30,780 --> 00:10:32,430 to the larger and wealthier countries 267 00:10:32,430 --> 00:10:34,890 around the developed world, who essentially have an army 268 00:10:34,890 --> 00:10:36,600 of cyber attackers that are combined 269 00:10:36,600 --> 00:10:39,210 into their military intelligence agencies. 270 00:10:39,210 --> 00:10:41,130 Tier six threat actors also are known to 271 00:10:41,130 --> 00:10:43,020 conduct supply chain attacks. 272 00:10:43,020 --> 00:10:46,110 For example, back in 2020, there was an attack 273 00:10:46,110 --> 00:10:48,570 on the company SolarWinds that was allegedly tied 274 00:10:48,570 --> 00:10:50,640 to Russian nation state actors. 275 00:10:50,640 --> 00:10:52,710 The threat actors hacked into SolarWinds 276 00:10:52,710 --> 00:10:56,130 in order to add a backdoor into the SolarWinds code base. 277 00:10:56,130 --> 00:10:58,560 SolarWinds had numerous corporations and governments 278 00:10:58,560 --> 00:11:01,080 as their users, so when this backdoor was embedded 279 00:11:01,080 --> 00:11:03,900 into their next update and release, all of these companies 280 00:11:03,900 --> 00:11:06,720 and government networks effectively became compromised 281 00:11:06,720 --> 00:11:09,270 and given over to this nation state actor. 282 00:11:09,270 --> 00:11:12,690 This attack was not directly targeted at SolarWinds though, 283 00:11:12,690 --> 00:11:15,690 it was really being directed at SolarWind's customers, 284 00:11:15,690 --> 00:11:18,000 making it a supply chain attack. 285 00:11:18,000 --> 00:11:20,460 Another attack credited to tier six nation states 286 00:11:20,460 --> 00:11:22,650 over the years, was the embedding of root kits 287 00:11:22,650 --> 00:11:25,020 into Cisco routers and switches that were purchased 288 00:11:25,020 --> 00:11:26,820 from third party suppliers. 289 00:11:26,820 --> 00:11:28,410 This is why supply chain management 290 00:11:28,410 --> 00:11:30,810 and using trusted suppliers becomes really important 291 00:11:30,810 --> 00:11:32,610 to the security of an organization. 292 00:11:32,610 --> 00:11:34,590 And it might be something you're asked to consider 293 00:11:34,590 --> 00:11:36,720 as part of the scope for an engagement. 294 00:11:36,720 --> 00:11:39,330 Now, to summarize this lesson, you need to remember 295 00:11:39,330 --> 00:11:41,550 that as you climb up the tiers of threat actors, 296 00:11:41,550 --> 00:11:44,460 going from one to six, you're gonna see more money, 297 00:11:44,460 --> 00:11:46,740 more skill, and more time being invested 298 00:11:46,740 --> 00:11:48,750 into the capabilities and attacks, 299 00:11:48,750 --> 00:11:50,610 because more is at stake based on what 300 00:11:50,610 --> 00:11:53,523 the threat actor's motivation is to conduct those attacks. 23919

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.