Simple play icon Course
Skills Expanded

OT Malware Analysis: FrostyGoop

by Josh Stroschein

This course will teach the basics of analyzing GoLang binaries and how to identify OT-specific threats using the FrostyGoop malware.

What you'll learn

Operational technology (OT) is at the core of critical infrastructure, and understanding how threat actors exploit it is essential for protecting these vital systems. Operational technology is what powers critical infrastructure all over the world and becomes a valuable target for threat actors to abuse. In this course, OT Malware Analysis: FrostyGoop, you’ll learn how to analyze malicious files to identify OT-specific threats. First, you’ll explore the nexus between OT systems and malware. Next, you’ll get hands-on analyzing the OT malware FrostyGoop to learn how threat actors can abuse OT protocols. Finally, you’ll use dynamic analysis to capture malware behavior and identify OT attack patterns. When you’re finished with this course, you’ll have the skills and knowledge of OT systems needed to identify malware targeting these systems.

About the author

Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineer... more

Ready to upskill? Get started