Technical Evidence of Attacks on Ukrainian Government Infrastructure

Logo
Presented by

Nicole Carignan, CounterCraft, Customer Success Manager, and David Barroso, CounterCraft, CEO

About this talk

An attack involving threat actors attempting to attack Ukrainian government infrastructure happened in one of our deception environments. These actors exploited the CVE-2021-4034 vulnerability in an attempt to run commands as privileged users. Due to the continued interest in this attack and the fascinating information it reveals, our team of experts will come together for a webinar to go over the recovered intel and the significance of it. In this webinar, we will discuss an in-depth analysis of this attack with our team of experts. Join Nicole Carignan, CounterCraft Customer Success Manager, and David Barroso, CEO, as they discuss the attack, go into detail on the TTPs, and talk about the possible implications going forward for the financial sector and critical infrastructure. What’s Included Attendees of the webinar will also receive: – The current intel from the attack – A download of the observables and scripts associated with the incident – Updates in your inbox on further intel from this continuing deception campaign
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (12)
Subscribers (1471)
CounterCraft is a cyber deception platform that offers active defense powered by high-interaction deception technology. Countercraft detects threats early, collects personalized, actionable intelligence, and enables organizations to defend their valuable data in real time.