We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Biohacking Village - Russian Cyber Threats in The Pandemic Era

00:00

Formal Metadata

Title
Biohacking Village - Russian Cyber Threats in The Pandemic Era
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Russia has seized upon the global Covid-19 pandemic as an opportunity to use its multifaceted, multidirectional information and cyberwarfare strategy against its prospective enemies. Russian state-sponsored hackers are using the coronavirus to spread different types of malware against western nations. Universities, hospitals and scientific facilities with access to classified information are targeted to steal data and research related to Covid-19. In this respect, the presentation will cover cyber-attack efforts against the healthcare industry in the United States and Europe. The presentation will discuss tactics, techniques and procedures (TTPs) of the advanced persistent threat (APT) groups. It will review Russian ransomware criminal actors and their communication channels (dark web). The presentation also will highlight the role of the siloviki (people of power) in the country’s information warfare efforts. It will examine the structural units of the Russian Federal Security service (FSB) and Russian military intelligence (GRU), their projects and their networks of allied criminal groups. It will discuss how intelligence organizations are using APT groups through complex outsourcing strategies to conduct cyberwarfare over a broad spectrum. The presentation suggests several factors that drive the current trends in Russian cyber capabilities. It will also survey current trends: growing sophistication of TTPs and tools, supply chain threats, false flag operations, deception tactics, third party entry vectors and cyber espionage. Finally, the Russian Cyber Threat presentation will cover the role and mission of the Russian Foundation for Advanced Research Projects in the Defense Industry, the Russian Army’s Technopolis, and Russia’s chemical, biological, medical, informational and research efforts.
CyberneticsInformationstheorieWeb syndicationHacker (term)CyberneticsStrategy gameGroup actionSelf-organizationComputer animation
SoftwareComputerComputer networkCyberneticsOperations researchStability theoryArtificial intelligenceStrategy gameFrequencyDisintegrationPhysical systemSystem programmingINTEGRALPhysical systemSoftwareBusiness informaticsInformationstheorieField (computer science)Food energyElement (mathematics)WeightArtificial neural networkComputer networkCartesian coordinate systemComputer animation
BuildingRange (statistics)Prime idealControl flowSoftwareOperations researchMathematicsInformationstheorieService (economics)Self-organizationInformation securityTheoryOcean currentTelecommunicationSoftwareDirection (geometry)Surface of revolutionVirtual machineFile formatCyberneticsBusiness informaticsEvent horizonState of matterField (computer science)Statement (computer science)HypothesisStaff (military)Web 2.0Functional (mathematics)Chaos (cosmogony)CodeSubset2 (number)CryptographyPlastikkarteQuicksortObject (grammar)Power (physics)Sinc functionMereologyComputer animation
Execution unitDivision (mathematics)Magneto-optical driveObservational studyHacker (term)ForceHypermediaProduct (business)SoftwareVolumeInformationstheoriePlastikkarteControl flowOperations researchCyberneticsTelecommunicationComputerComputer networkDrop (liquid)Social softwareOrder (biology)Maß <Mathematik>Execution unitObservational studyCase moddingGroup actionCyberneticsHacker (term)Division (mathematics)Traffic reportingCentralizer and normalizerOperator (mathematics)BuildingRepository (publishing)Forcing (mathematics)InformationstheorieInformation securityVector potentialSoftwareMultilaterationStudent's t-testPhysical systemGame controllerMusical ensembleDomain nameProjective planeStatement (computer science)Software developerSelf-organizationVulnerability (computing)Data managementFile formatDoubling the cubeBitFatou-MengeBusiness informaticsCryptographyIncidence algebraSpektrum <Mathematik>Data structureTelecommunicationComputerWireless LAN
Menu (computing)Pattern languageRepeating decimalInformation managementHill differential equationNormed vector spaceMotion blurThomas KuhnExecution unitInformationstheorieSource codeGroup actionTerm (mathematics)Virtual machineComputer virusPermanentSurgeryDivision (mathematics)Basis <Mathematik>RoboticsStatement (computer science)Food energyMultimediaMedical imagingField (computer science)Distribution (mathematics)Computer simulationSupercomputerDirection (geometry)Information securityCyberneticsSoftware testingCategory of beingExecution unitBitArmSoftware developerTelecommunicationUniverse (mathematics)Self-organizationSimulationEnterprise architectureElectronic signatureRepresentation (politics)Portable communications deviceSign (mathematics)Projective planeComputer animation
Information securityInformationstheorieSimulationProduct (business)EncryptionService (economics)Term (mathematics)Hacker (term)Scalable Coherent InterfaceExecution unitComputerLink (knot theory)ForceTablet computerState of matterCryptographyInformationstheorieVery-high-bit-rate digital subscriber lineBlack boxCyberneticsGroup actionIn-System-ProgrammierungRow (database)EmailTelecommunicationData conversionWave packetBitExecution unitInternet service providerContent (media)Tap (transformer)CausalityField (computer science)SoftwareProjective planeLine (geometry)SubsetOperator (mathematics)Real-time operating systemForcing (mathematics)Physical systemSlide ruleService (economics)Resolvent formalismMeasurementDifferent (Kate Ryan album)Hacker (term)Computer animation
IntranetComputer networkSocial softwareLinker (computing)TwitterTopologyInternetworkingTablet computerSoftwareInformation securityHacker (term)InformationstheorieSelf-organizationService (economics)Execution unitProjective planePower (physics)Server (computing)Link (knot theory)Design by contractOrder (biology)SoftwareLeakEndliche ModelltheorieHypermediaAsynchronous Transfer ModeWeightInternet der DingeKolmogorov complexity
Computer programDiagramLocal GroupKolmogorov complexityStrategy gameHacker (term)Attribute grammarData managementOperator (mathematics)Projective planeOrder (biology)Process (computing)Kolmogorov complexityMathematicsGame controllerTask (computing)Computer animation
InformationstheorieComputer virusMaizeExplosionFingerprintCyberneticsInformationstheorieStrategy gameContent (media)Condition numberGroup actionView (database)Self-organizationShared memoryMultiplication signWeb syndicationMusical ensembleInformation securityTraffic reportingChannel capacityHypermediaElement (mathematics)Connectivity (graph theory)Natural languageComputer crime
Complex (psychology)CyberneticsEuclidean vectorDenial-of-service attackEmailVariety (linguistics)SoftwareHypermediaSocial softwareComputing platformWebsiteComputer networkImage registrationTime domainRemote Access ServiceWeb 2.0Mobile appPhysical systemCorrelation and dependenceHoaxCyberneticsPhysical systemWeb 2.0Virtuelles privates NetzwerkSlide ruleHypermediaComputer virusElement (mathematics)Remote procedure callTrailSoftwareConnectivity (graph theory)Cartesian coordinate systemComputer animation
Personal digital assistantDomain nameComputerAndroid (robot)Tap (transformer)Gamma functionInformationstheorieSlide ruleNumberVideo gameCartesian coordinate systemSelf-organizationHoaxLevel (video gaming)EmailTrailImage registrationDomain nameGroup actionComputer crimeStrategy gameLink (knot theory)GoogolTouchscreenFrequencyUniverse (mathematics)Computer animation
Exploit (computer security)Time domainLocal area networkHacker (term)AlgorithmFunction (mathematics)Computer forensicsSoftwareTrojanisches Pferd <Informatik>VotingEncryptionServer (computing)Information securityVirtuelles privates NetzwerkGame controllerTranslation (relic)Computer configurationInternet forumNatural languageMalwareComputing platformService (economics)Product (business)InformationstheorieLevel (video gaming)PasswordVulnerability (computing)MalwareOperator (mathematics)Group actionSelf-organizationHacker (term)HoaxInternet forumFrequencyPatch (Unix)Exploit (computer security)InternetworkingDomain nameCohen's kappaFilm editingOrder (biology)Semiconductor memoryPhysical systemEmailCodeCategory of beingRemote procedure callStrategy gameGame theoryServer (computing)Presentation of a groupGame controllerDeep WebCyberneticsPhysical lawSoftwareTask (computing)WebsiteMultiplication signCommunications protocolAlgorithmEncryptionScripting languageRootComputer animation
EmailWordMacro (computer science)Self-organizationComputer wormInformationstheorieFunction (mathematics)Motion captureTouchscreenCyberneticsTemplate (C++)Vector spaceOffice suiteLink (knot theory)System identificationNatural languageCodeWeb pageAddress spaceInjektivitätComputer networkScripting languageGroup actionMacro (computer science)InternetworkingGamma functionTemplate (C++)SoftwareEmailCodeSelf-organizationInjektivitätAddress spaceFrequencyGame controllerComputer fileMultiplication signIP addressRemote administrationComputer crimeComputer animation
Service (economics)Staff (military)Compilation albumPlastikkarteMaizeLink (knot theory)Hacker (term)Local GroupComputerVirtual realitySystem programmingLaptopEmailPasswordInternet service providerComputer crimeInformationstheorieService (economics)Business informaticsGroup actionLink (knot theory)Variety (linguistics)Server (computing)Multiplication signConnected spaceVulnerability (computing)PasswordRemote procedure callEmailForschungszentrum RossendorfEncryption
EncryptionData modelComputerComputer fileRSA (algorithm)Uniqueness quantificationAdvanced Encryption StandardEmailHacker (term)Local GroupManufacturing execution systemRemote procedure callEmailSelf-organizationPhysical systemVulnerability (computing)Communications protocolGroup actionInformation securityEndliche ModelltheorieHacker (term)Process (computing)Trojanisches Pferd <Informatik>Open setComputer wormInformationstheorieEncryptionVector spaceRecursive descent parserMusical ensemble
ImplementationDynamic random-access memorySupremumHacker (term)InformationstheorieDeep WebStrategy gameStaff (military)CASE <Informatik>BitInternet forumOrder (biology)ChainDivisorAuthenticationCyberneticsPresentation of a groupPhysical systemElement (mathematics)Web 2.0MalwareSheaf (mathematics)Multiplication signWave packet
Transcript: Englisch(auto-generated)