OT Malware Analysis: FrostyGoop
This course will teach the basics of analyzing GoLang binaries and how to identify OT-specific threats using the FrostyGoop malware.
What you'll learn
Operational technology (OT) is at the core of critical infrastructure, and understanding how threat actors exploit it is essential for protecting these vital systems. Operational technology is what powers critical infrastructure all over the world and becomes a valuable target for threat actors to abuse. In this course, OT Malware Analysis: FrostyGoop, you’ll learn how to analyze malicious files to identify OT-specific threats. First, you’ll explore the nexus between OT systems and malware. Next, you’ll get hands-on analyzing the OT malware FrostyGoop to learn how threat actors can abuse OT protocols. Finally, you’ll use dynamic analysis to capture malware behavior and identify OT attack patterns. When you’re finished with this course, you’ll have the skills and knowledge of OT systems needed to identify malware targeting these systems.