Inside North Korea’s Cyber Ops with Silas Cutler
Contents
In this exclusive threat intelligence briefing, Censys malware analyst and principal security researcher Silas Cutler delivers a must-watch session revealing newly uncovered details about the BeaverTail malware and North Korea’s covert IT worker program. From NPM supply chain attacks to fake job applications, this is a rare look inside a campaign funding the DPRK’s weapons development efforts through cyber means.
This briefing covers:
- How BeaverTail malware steals crypto wallets and credentials
- Details of new C2 infrastructure and attacker comms
- The surprising economic scale of North Korea’s cyber-mercenary operations
- How adversaries are embedding in major tech companies to wage global cyber campaigns
We’ll also take you behind the scenes with Censys’ new Threat Hunting Module.
Immediately following the research briefing, Censys Director of Product Morgan Princing introduces our newest tool for defenders: the Censys Threat Hunting Module.
Built by threat hunters, for threat hunters, this powerful new module unlocks:
- Real-time infrastructure scanning
- Embedded threat context
- …
This briefing covers:
- How BeaverTail malware steals crypto wallets and credentials
- Details of new C2 infrastructure and attacker comms
- The surprising economic scale of North Korea’s cyber-mercenary operations
- How adversaries are embedding in major tech companies to wage global cyber campaigns
We’ll also take you behind the scenes with Censys’ new Threat Hunting Module.
Immediately following the research briefing, Censys Director of Product Morgan Princing introduces our newest tool for defenders: the Censys Threat Hunting Module.
Built by threat hunters, for threat hunters, this powerful new module unlocks:
- Real-time infrastructure scanning
- Embedded threat context
- …