System Binary Proxy Execution and a Spearphish Payload

Cybrary
Course

Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Time
1 hour 40 minutes
Difficulty
Intermediate
CEU/CPE
2
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: APT41 Introduction
Campaign Overview
10m
Module 2: System Binary Proxy Execution and a Spearphish Payload

2.1What is the “Phishing: Spearphishing Attachment” Sub-Technique?

15m

2.2What is the “System Binary Proxy Execution: Compiled HTML File” Sub-Technique?

15m

2.3Detection, Validation, and Mitigation (Lab)

1h
Course Description

Adversaries can execute an attack by embedding malware into a document, attaching that document to an email, crafting the email message to entice the target, and then sending the email to the target.

The first technique we cover, Spearphishing Attachment, is generally one of the first steps in an attack process. By this point, the adversary has already performed some reconnaissance and resource development.

The primary risk associated with the second technique we cover, Compiled HTML File, is the execution of unauthorized/malicious code without detection, and any subsequent impacts. For the purpose of this course, it will be observed as a file contained in an email attachment associated with a Spearphishing Attachment as part of an Initial Access attempt.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack.

Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the threat group APT41 (aka Double Dragon). Prevent adversaries from accomplishing the tactic of initial access.

Instructed By
Chris Daywalt
Chris Daywalt
Security Freelancer
Instructor
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a System Binary Proxy Execution and a Spearphish Payload Certificate of Completion