
Threat actors aren't knocking at your door – they're already inside. This reality makes threat hunting a crucial defense weapon in today's landscape.
This presentation explores two challenging cybersecurity aspects: long-term tracking and attribution through a real-world case study. What began as routine threat hunting evolved into a two-year investigation exposing a new Chinese APT group operating undetected in government networks worldwide.
Persistent hunting revealed a sophisticated adversary using rare, never-seen-before TTPs. Their distinct OPSEC and methodologies required innovative hunting approaches to track this elusive nation-state actor.
The attribution process connected incidents across multiple countries through systematic detective work, establishing the Chinese nexus connection. We'll walk through the attack lifecycle, explore unique TTPs, and reveal overlooked hunting opportunities.
Attendees will receive actionable tools and attribution methods that work regardless of security infrastructure, proven methodologies for advanced threat hunting, and practical guidance for exposing stealthy APTs operating in their environments.
