Sandworm: Keylogging Emulation
by Matthew Lloyd Davies
Discover how Advanced Persistent Threat (APT) Actors, such as Sandworm, use keylogging for input capture in victim environments to acquire credentials for new access opportunities within victim environments.
What you'll learn
During the 2015 Ukraine Electric Power Attack, Sandworm used keylogging to gather account credentials via a BlackEnergy keylogger plugin.
Adversaries log keystrokes to intercept credentials as the user types them to acquire credentials for new access opportunities when other credential dumping techniques fail. In this course, Sandworm: Keylogging Emulation, you’ll discover the many different ways an attacker can capture keystrokes, including Hooking API callbacks, reading raw keystroke data from the hardware buffer, as well as custom scripts.
About the author
Matt is a cyber security author and researcher here at Pluralsight. A certified penetration tester and incident handler, he created Pluralsight's CompTIA Pentest+ Specialized Attacks courses as well our courses on wireless, ICS/OT and hardware hacking. Matt has also helped to build our security labs portfolio; labs that help you get hands-on to understand the threats and vulnerabilities your organization faces today. With a background in Chemical Engineering, Matt's focus is on the security ... moreof Operational Technology, and particularly Industrial Control Systems. With the explosive growth of Industry 4.0 and the Industrial Internet of Things, Matt is passionate about educating the next generation of cyber security professionals to front up to the challenges faced by critical national infrastructure organizations around the world.