{"id":30839,"date":"2022-08-09T11:31:14","date_gmt":"2022-08-09T15:31:14","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/black-hat-2022-preview\/30839\/"},"modified":"2022-08-10T19:35:43","modified_gmt":"2022-08-10T08:35:43","slug":"black-hat-2022-preview","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/black-hat-2022-preview\/30839\/","title":{"rendered":"Previewing Black Hat 2022"},"content":{"rendered":"<p>With Black Hat 2022 kicking off this week, we wanted to check in with some of our Kaspersky Global Research and Analysis Team (GReAT) members to see what they\u2019re most looking forward to. What sessions are they hoping to attend? What new trends will emerge? What hot topics are missing from the event this year?<\/p>\n<h2><a href=\"https:\/\/twitter.com\/k_sec\" target=\"_blank\" rel=\"nofollow noopener\">Kurt Baumgartner<\/a>, principal security researcher<\/h2>\n<p>The first thing that\u2019s piqued my attention coming up in Black Hat 2022 is Kim Zetter\u2019s keynote \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#keynote-kim-zetter-28933\" target=\"_blank\" rel=\"nofollow noopener\">Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed<\/a>.\u201d Of course, <a href=\"https:\/\/securelist.com\/stuxnet-zero-victims\/67483\/\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a> changed things, but her perspective on ongoing security issues in light of past events and consequences should be fantastic.<\/p>\n<p>The vast majority of talks this year are on offensive operations. There are also more than a handful of talks on \u201ccyber-physical systems,\u201d including Siemens\u2019 devices, <a href=\"https:\/\/usa.kaspersky.com\/blog\/automotive-apps-security\/26535\/\" target=\"_blank\" rel=\"noopener\">automotive remote keyless entry<\/a>, secure radio communications and more. Some of the technical wizardry and its implications have become more alarming, and since Stuxnet \u2013 more understandable to the general audience.<\/p>\n<p>A couple of other talks look particularly interesting due to the use of novel exploitation techniques and implications for large scale authentication schemes from well-known offensive researchers: \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#i-am-whoever-i-say-i-am-infiltrating-identity-providers-using-a-click-exploit-26946\" target=\"_blank\" rel=\"noopener nofollow\">I Am Whoever I Say I Am: Infiltrating Identity Providers Using a 0Click Exploit<\/a>\u201d and \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#elevating-kerberos-to-the-next-level-26806\" target=\"_blank\" rel=\"noopener nofollow\">Elevating Kerberos to the Next Level<\/a>.\u201d<\/p>\n<p>I would\u2019ve expected to see more offensive talks on attacking various machine-learning technologies and offensive cryptocurrency research.<\/p>\n<h2>Giampaolo Dedola, senior security researcher<\/h2>\n<p>I\u2019m glad that many Black Hat briefings reflect what Kaspersky experts foresaw in their <a href=\"https:\/\/securelist.com\/advanced-threat-predictions-for-2022\/104870\/\" target=\"_blank\" rel=\"noopener\">APT predictions for 2022<\/a>, confirming our insights on the current state of cybersecurity.<\/p>\n<p>Several talks deserve special attention \u2013 related to and covering this year\u2019s disruptive attacks and the geopolitical crisis in Ukraine. Since such topics are an essential part of the agenda, it confirms a strict interrelation between the digital and real world, and that cybersecurity is becoming even more relevant for ensuring <a href=\"https:\/\/usa.kaspersky.com\/blog\/stalkerware-in-2021\/26363\/\" target=\"_blank\" rel=\"noopener\">physical safety<\/a>.<\/p>\n<p>This trend will expand in the future, as cyberattacks are already reaching targets beyond our planet, such as the attacks against ViaSat satellites and Starlink.<\/p>\n<p>Finally, Black Hat will touch upon a growing issue: the ethics of how a government could exploit cyber operations to fabricate evidence to frame and incarcerate vulnerable opponents.<\/p>\n<h2><a href=\"https:\/\/twitter.com\/jorntvdw\" target=\"_blank\" rel=\"noopener nofollow\">Jornt van der Wiel<\/a>, senior security researcher<\/h2>\n<p>Black Hat\u2019s interesting schedule covers a variety of topics related to exploitation of devices, systems, and certain equipment that\u2019s not easily updated. As for research, it will be useful to learn about new methods of <a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#android-universal-root-exploiting-mobile-gpu--command-queue-drivers-27239\" target=\"_blank\" rel=\"nofollow noopener\">mobile GPU exploitation on Android<\/a>. Another interesting issue is the novel vulnerabilities and exploitation techniques that <a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#trace-me-if-you-can-bypassing-linux-syscall-tracing-26427\" target=\"_blank\" rel=\"nofollow noopener\">reliably bypass Linux syscall tracing<\/a>. I\u2019m also looking forward to \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#breaking-firmware-trust-from-pre-efi-exploiting-early-boot-phases-27229\" target=\"_blank\" rel=\"nofollow noopener\">Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases<\/a>,\u201d as it should elaborate on <a href=\"https:\/\/securelist.com\/cosmicstrand-uefi-firmware-rootkit\/106973\/\" target=\"_blank\" rel=\"nofollow noopener\">UEFI firmware<\/a>, a recent hot theme due to its allowing malware to run even after the system is reinstalled.<\/p>\n<p>We expect that some of these vulnerabilities and exploits that are \u201charder to patch on all devices\u201d will be abused by cybercriminals and appear in the wild soon.<\/p>\n<h2><a href=\"https:\/\/twitter.com\/oct0xor\" target=\"_blank\" rel=\"nofollow noopener\">Boris Larin<\/a>, lead security researcher<\/h2>\n<p>I expect in-the-wild zero-days and microarchitectural\/firmware threats to be the key topics of the conference. In the last few years, with the help of our technologies, we\u2019ve discovered more than a dozen actively exploited zero-day exploits used by <a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"nofollow noopener\">different APTs<\/a> (MysterySnail, PuzzleMaker, WizardOpium), and a number of novel UEFI rootkits (<a href=\"https:\/\/securelist.com\/cosmicstrand-uefi-firmware-rootkit\/106973\/\" target=\"_blank\" rel=\"nofollow noopener\">CosmicStrand<\/a>, <a href=\"https:\/\/securelist.com\/moonbounce-the-dark-side-of-uefi-firmware\/105468\/\" target=\"_blank\" rel=\"nofollow noopener\">MoonBounce<\/a>, FinSpy, <a href=\"https:\/\/securelist.com\/mosaicregressor\/98849\/\" target=\"_blank\" rel=\"nofollow noopener\">MosaicRegressor<\/a>).<\/p>\n<p>Our findings show that these threats are becoming more relevant than ever. Attacks using such sophisticated techniques are becoming more common and widespread. Personally, I\u2019m really looking forward to a number of presentations dedicated to these topics, such as: \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#monitoring-surveillance-vendors-a-deep-dive-into-in-the-wild-android-full-chains-in--26629\" target=\"_blank\" rel=\"nofollow noopener\">Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021<\/a>,\u201d \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#architecturally-leaking-data-from-the-microarchitecture-26559\" target=\"_blank\" rel=\"nofollow noopener\">Architecturally Leaking Data from the Microarchitecture<\/a>\u201d and \u201c<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#do-not-trust-the-asa-trojans-27162\" target=\"_blank\" rel=\"nofollow noopener\">Do Not Trust the ASA, Trojans!<\/a>\u201d<\/p>\n<p>If you\u2019re also attending Black Hat this year, let us know what topics and talks you\u2019re most looking forward to. You can find more insights and reports from our experts on <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A look at what experts at Kaspersky will be watching during Black Hat 2022. <\/p>\n","protected":false},"author":2671,"featured_media":30842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993,2647],"tags":[2576,770,282,844,605],"class_list":{"0":"post-30839","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-special-projects","10":"tag-bhusa","11":"tag-black-hat","12":"tag-cybersecurity","13":"tag-events","14":"tag-great"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/black-hat-2022-preview\/30839\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/black-hat-2022-preview\/24436\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/black-hat-2022-preview\/19902\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/black-hat-2022-preview\/26873\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/black-hat-2022-preview\/24780\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/black-hat-2022-preview\/33823\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/black-hat-2022-preview\/45108\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/black-hat-2022-preview\/25334\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/black-hat-2022-preview\/30548\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2671"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=30839"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30839\/revisions"}],"predecessor-version":[{"id":30843,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30839\/revisions\/30843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/30842"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=30839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=30839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=30839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}