What does TTP stand for? Bonus points: Explain the difference between them.
Tactics - High level objective or goal
Techniques - specific methods/actions used
Procedures- Detailed step-by-step process
What does Microsoft name new Russia Cyber Threat Actors?
Blizzard + "Motive"
What cyber threat actor(s) were responsible for the famous MGM breach last year? Hint: We talked about this on the DE podcast.
Scattered Spider & ALPHV/BlackCat
In the past 2 years, which cyber attack type has been the most popular?
Ransomware
What is the motive behind a cryptojacking attack?
Financial gain
What is the difference between a T1592 and a T1592.002?
Technique - sub technique
What are typical motives of China-linked Cyber Threat Actors?
Cyber Espionage and/or Financial gain
How many times has AT&T been cyber attacked within the past year?
What attack type is related to our ATO services at DE?
Data Breach
What motive falls under Data Breach attacks, but not Ransomware attacks?
Information Theft
How many tactics are included in the MITRE ATT&CK framework?
14
What was the latest cyber attack attributed to APT 29?
TeamViewer
How many companies were affected by the recent Snowflake breach?
100+
What malware attack recently became popular due to its use of emojis? Bonus points: What were the emojis used for?
Disgomoji
C2 communication in discord
What threat actor has been conducting an ongoing Cyber Espionage campaign on the US utilizing living-off-the-land techniques?
Volt Typhoon
What MITRE ATT&CK tactic is aligned with scheduled tasks?
Persistence
What Country-linked cyber threat actors employs cryptojacking the most?
North Korea
What supermassive breach revealed 26 billion records due to a "firewall misconfiguration" this year?
MOAB (Mother of all Breaches)
How much Bitcoin did AT&T pay to ShinyHunters for deleting stolen customer data?
5.7 bitcoin
What motivation is it called when threat actors cause the most chaos?
Disruption
Why are "phishing" and "phishing for Information" under different tactic types? Bonus: What categories do they fall under?
Phishing for information (Reconnaissance) - Attempt to trick targets into divulging information, frequently credentials or other actionable information that can be used in more targeted attacks.
Phishing (initial access) - Adversaries may send victims emails (gathered by phishing for information) containing malicious attachments or links, typically to execute malicious code on victim systems.
What Countries have put cyber security sanctions on Iran?
United Kingdom
United States
EU
Canada
What attack was dubbed the "largest attack in internet history" and subsequently caused the said company to mitigate 71 million requests-per-second? Hint: this took place in the second half of 2023
HTTP/2 Rapid Reset - Cloudfare
List atleast 3 mitigations to DDoS attacks
Traffic filtering / rate limiting
Traffic scrubbing / cleaning centers
Cloud based DDoS protection
Network segmentation and Redundancy
Application layer protection
What are 10 different types of hackers?
White hat
Black hat
Gray hat
Script Kiddies
Green hat
Blue hat
Red hat
Hacktivist
State Hackers
Whistleblowers