Cyberwar on a Shoestring: How Kim Jong Un Stole My Malware

Posted on in Presentations

Global superpowers do not have a monopoly on cyber-warfare. Smaller nations and even nonstate actors may soon crash the party. This presentation will map a viable shortcut to the cyber-battlefield: reverse engineering advanced persistent threat (APT) digital weapons and replacing the payload with a custom Molotov cocktail. The strategic implications of this tactical chicanery are enormous.

Learning Objectives:
1: Explore a critical and often-overlooked aspect of cyber-warfare.
2: Understand the ease with which re-weaponization of malware is possible.
3: Learn how to prepare for this cutting-edge challenge.

Dr. Kenneth Geers


External Communications Analyst, Very Good Security

Kārlis Podiņš


Threat Analyst,

Hackers & Threats

cyber espionage anti-malware threat intelligence cyber warfare & cyber weapons



Share With Your Community