What You Need to Know Before
You Start

Starts 8 June 2025 06:40

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

MoustachedBouncer - AitM-Powered Surveillance via Belarus ISPs

Uncovers advanced espionage group using AitM attacks and ISP-level tampering in Belarus to target diplomats with custom malware, highlighting sophisticated surveillance techniques.
Black Hat via YouTube

Black Hat

2544 Courses


37 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Uncovers advanced espionage group using AitM attacks and ISP-level tampering in Belarus to target diplomats with custom malware, highlighting sophisticated surveillance techniques.

Syllabus

  • Introduction to MoustachedBouncer
  • Overview of the espionage group
    Key objectives and methods
  • Understanding AitM (Adversary-in-the-Middle) Attacks
  • Definition and components of AitM attacks
    Examples of AitM attacks in cybersecurity
  • ISP-Level Tampering Techniques
  • How ISPs can be leveraged for surveillance
    Case studies of ISP involvement in cyber espionage
  • Targeting Diplomats: Strategies and Consequences
  • Specific tactics used against diplomats
    Impact of surveillance on diplomatic missions
  • Development and Deployment of Custom Malware
  • Anatomy of custom malware used by MoustachedBouncer
    Detection and mitigation strategies
  • Belarus ISPs and International Cybersecurity Concerns
  • Role of Belarus ISPs in global cyber landscape
    International response and policy implications
  • Advanced Surveillance Techniques by Espionage Groups
  • Evolution of digital surveillance methods
    Ethical considerations and privacy concerns
  • Tools and Techniques for Cyber Defense
  • Emerging technologies in anti-surveillance
    Best practices for protecting sensitive targets
  • Case Study Analysis
  • Detailed examination of documented incidents
    Lessons learned and future outlook
  • Conclusion and Future Trends
  • The future of AitM attacks and ISP collaboration
    Possible advancements in cybersecurity to counter espionage
  • Additional Resources
  • Recommended readings
    Relevant research papers and articles

Subjects

Conference Talks