{"id":19798,"date":"2022-08-09T08:30:15","date_gmt":"2022-08-09T16:30:15","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/08\/09\/news-13531\/"},"modified":"2022-08-09T08:30:15","modified_gmt":"2022-08-09T16:30:15","slug":"news-13531","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/08\/09\/news-13531\/","title":{"rendered":"Topics to expect at Black Hat 2022 | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/09112006\/black-hat-2022-preview.jpg\"\/><\/p>\n<p><strong>Credit to Author: Erica Navar| Date: Tue, 09 Aug 2022 15:31:14 +0000<\/strong><\/p>\n<p>With Black Hat 2022 kicking off this week, we wanted to check in with some of our Kaspersky Global Research and Analysis Team (GReAT) members to see what they&#8217;re most looking forward to. What sessions are they hoping to attend? What new trends will emerge? What hot topics are missing from the event this year?<\/p>\n<h2><a href=\"https:\/\/twitter.com\/k_sec\" target=\"_blank\" rel=\"nofollow noopener\">Kurt Baumgartner<\/a>, principal security researcher<\/h2>\n<p>The first thing that&#8217;s piqued my attention coming up in Black Hat 2022 is Kim Zetter&#8217;s keynote &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#keynote-kim-zetter-28933\" target=\"_blank\" rel=\"nofollow noopener\">Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed<\/a>.&#8221; Of course, <a href=\"https:\/\/securelist.com\/stuxnet-zero-victims\/67483\/\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a> changed things, but her perspective on ongoing security issues in light of past events and consequences should be fantastic.<\/p>\n<p>The vast majority of talks this year are on offensive operations. There are also more than a handful of talks on &#8220;cyber-physical systems,&#8221; including Siemens&#8217; devices, <a href=\"https:\/\/usa.kaspersky.com\/blog\/automotive-apps-security\/26535\/\" target=\"_blank\" rel=\"noopener\">automotive remote keyless entry<\/a>, secure radio communications and more. Some of the technical wizardry and its implications have become more alarming, and since Stuxnet \u2013 more understandable to the general audience.<\/p>\n<p>A couple of other talks look particularly interesting due to the use of novel exploitation techniques and implications for large scale authentication schemes from well-known offensive researchers: &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#i-am-whoever-i-say-i-am-infiltrating-identity-providers-using-a-click-exploit-26946\" target=\"_blank\" rel=\"noopener\">I Am Whoever I Say I Am: Infiltrating Identity Providers Using a 0Click Exploit<\/a>&#8221; and &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#elevating-kerberos-to-the-next-level-26806\" target=\"_blank\" rel=\"noopener\">Elevating Kerberos to the Next Level<\/a>.&#8221;<\/p>\n<p>I would&#8217;ve expected to see more offensive talks on attacking various machine-learning technologies and offensive cryptocurrency research.<\/p>\n<h2>Giampaolo Dedola, senior security researcher<\/h2>\n<p>I&#8217;m glad that many Black Hat briefings reflect what Kaspersky experts foresaw in their <a href=\"https:\/\/securelist.com\/advanced-threat-predictions-for-2022\/104870\/\" target=\"_blank\" rel=\"noopener\">APT predictions for 2022<\/a>, confirming our insights on the current state of cybersecurity.<\/p>\n<p>Several talks deserve special attention \u2013 related to and covering this year&#8217;s disruptive attacks and the geopolitical crisis in Ukraine. Since such topics are an essential part of the agenda, it confirms a strict interrelation between the digital and real world, and that cybersecurity is becoming even more relevant for ensuring <a href=\"https:\/\/usa.kaspersky.com\/blog\/stalkerware-in-2021\/26363\/\" target=\"_blank\" rel=\"noopener\">physical safety<\/a>.<\/p>\n<p>This trend will expand in the future, as cyberattacks are already reaching targets beyond our planet, such as the attacks against ViaSat satellites and Starlink.<\/p>\n<p>Finally, Black Hat will touch upon a growing issue: the ethics of how a government could exploit cyber operations to fabricate evidence to frame and incarcerate vulnerable opponents.<\/p>\n<h2><a href=\"https:\/\/twitter.com\/jorntvdw\" target=\"_blank\" rel=\"noopener\">Jornt van der Wiel<\/a>, senior security researcher<\/h2>\n<p>Black Hat&#8217;s interesting schedule covers a variety of topics related to exploitation of devices, systems, and certain equipment that&#8217;s not easily updated. As for research, it will be useful to learn about new methods of <a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#android-universal-root-exploiting-mobile-gpu--command-queue-drivers-27239\" target=\"_blank\" rel=\"nofollow noopener\">mobile GPU exploitation on Android<\/a>. Another interesting issue is the novel vulnerabilities and exploitation techniques that <a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#trace-me-if-you-can-bypassing-linux-syscall-tracing-26427\" target=\"_blank\" rel=\"nofollow noopener\">reliably bypass Linux syscall tracing<\/a>. I&#8217;m also looking forward to &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#breaking-firmware-trust-from-pre-efi-exploiting-early-boot-phases-27229\" target=\"_blank\" rel=\"nofollow noopener\">Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases<\/a>,&#8221; as it should elaborate on <a href=\"https:\/\/securelist.com\/cosmicstrand-uefi-firmware-rootkit\/106973\/\" target=\"_blank\" rel=\"nofollow noopener\">UEFI firmware<\/a>, a recent hot theme due to its allowing malware to run even after the system is reinstalled.<\/p>\n<p>We expect that some of these vulnerabilities and exploits that are &#8220;harder to patch on all devices&#8221; will be abused by cybercriminals and appear in the wild soon.<\/p>\n<h2><a href=\"https:\/\/twitter.com\/oct0xor\" target=\"_blank\" rel=\"nofollow noopener\">Boris Larin<\/a>, senior security researcher<\/h2>\n<p>I expect in-the-wild zero-days and microarchitectural\/firmware threats to be the key topics of the conference. In the last few years, with the help of our technologies, we&#8217;ve discovered more than a dozen actively exploited zero-day exploits used by <a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"nofollow noopener\">different APTs<\/a> (MysterySnail, PuzzleMaker, WizardOpium), and a number of novel UEFI rootkits (<a href=\"https:\/\/securelist.com\/cosmicstrand-uefi-firmware-rootkit\/106973\/\" target=\"_blank\" rel=\"nofollow noopener\">CosmicStrand<\/a>, <a href=\"https:\/\/securelist.com\/moonbounce-the-dark-side-of-uefi-firmware\/105468\/\" target=\"_blank\" rel=\"nofollow noopener\">MoonBounce<\/a>, FinSpy, <a href=\"https:\/\/securelist.com\/mosaicregressor\/98849\/\" target=\"_blank\" rel=\"nofollow noopener\">MosaicRegressor<\/a>).<\/p>\n<p>Our findings show that these threats are becoming more relevant than ever. Attacks using such sophisticated techniques are becoming more common and widespread. Personally, I&#8217;m really looking forward to a number of presentations dedicated to these topics, such as: &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#monitoring-surveillance-vendors-a-deep-dive-into-in-the-wild-android-full-chains-in--26629\" target=\"_blank\" rel=\"nofollow noopener\">Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021<\/a>,&#8221; &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#architecturally-leaking-data-from-the-microarchitecture-26559\" target=\"_blank\" rel=\"nofollow noopener\">Architecturally Leaking Data from the Microarchitecture<\/a>&#8221; and &#8220;<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#do-not-trust-the-asa-trojans-27162\" target=\"_blank\" rel=\"nofollow noopener\">Do Not Trust the ASA, Trojans!<\/a>&#8221;<\/p>\n<p>If you&#8217;re also attending Black Hat this year, let us know what topics and talks you&#8217;re most looking forward to. You can find more insights and reports from our experts on <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/black-hat-2022-preview\/45108\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/08\/09112006\/black-hat-2022-preview.jpg\"\/><\/p>\n<p><strong>Credit to Author: Erica Navar| Date: Tue, 09 Aug 2022 15:31:14 +0000<\/strong><\/p>\n<p>A look at what experts at Kaspersky will be watching during Black Hat 2022 conference.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[13191,13192,1001,4500,12177,11295,10458,15495],"class_list":["post-19798","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-bhusa","tag-black-hat","tag-business","tag-cybersecurity","tag-enterprise","tag-events","tag-great","tag-special-projects"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19798"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19798\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}