It’s All Just A (Pipe)Dream: Using Free Tools to Threat Hunt for Nation-State Control System Hackers


Want to know how to use free, open-source tools to hunt for the recently discovered nation-state control system hacking toolkit? In this edition of #techtalktuesday, we explore two of the protocols leveraged by the advanced persistent threat actors who wrote INCONTROLLER and look at how to detect or threat hunt for INCONTROLLER-like techniques. The approach we cover isn’t just exclusive to the INCONTROLLER protocols targeted, so we will also discuss how to apply lessons learned to other industrial protocols to improve your threat-hunting or detection efforts.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top