Hunting for Implant

Refs

My Realization

There are network parts and there are host parts, which can all be used to hunt for Threat Actor's Implants, either by network behavior, IOC, or TTP of that implant. So I think: "Hey, the threat actor when I read DFIR report or any report besides nation-state threat actors always use a custom known implant, would it be cool if I study their behavior and then point out what is special about it" -> This question is kinda stupid in my opinion, not cost-effective and time effective either. So here we are, trying to learn one or 2 implants in order to get the hang of it, the hunting implant process

What is an Implant?

Last updated

Was this helpful?