{"id":11301,"date":"2016-02-12T11:31:08","date_gmt":"2016-02-12T16:31:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=11301"},"modified":"2017-09-24T08:09:27","modified_gmt":"2017-09-24T12:09:27","slug":"sas-top-tweets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/sas-top-tweets\/11301\/","title":{"rendered":"Top 10 Tweets from the SAS 2016"},"content":{"rendered":"<p>The SAS has come and gone. A lot of great knowledge was dropped during the conference including insights on <a href=\"https:\/\/www.kaspersky.com\/blog\/poseidon-apt-boutique\/11264\/\" target=\"_blank\" rel=\"noopener nofollow\">Poseidon<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/adwind-rat\/11252\/\" target=\"_blank\" rel=\"noopener nofollow\">Adwind<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/metel-gcman-carbanak\/11236\/\" target=\"_blank\" rel=\"noopener nofollow\">Metel<\/a>. As we come back to reality, we wanted to summarize the event with some of the top Tweets (in no particular order) that we saw during the conference. Let us know in the comments below if we missed any.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">All set;) <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/d4CmEhou2S\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/d4CmEhou2S<\/a><\/p>\n<p>\u2014 Dasha Diaz (@dariaski) <a href=\"https:\/\/twitter.com\/dariaski\/status\/695337544309846016?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 4, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Our GReAT experts were quite excited to get to Tenerife and get everything set up and ready for a great conference.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Opening <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> surprise appearance by <a href=\"https:\/\/twitter.com\/RAPst4r?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@RAPst4r<\/a>, who has better stage presence than most infosec presenters. <a href=\"https:\/\/t.co\/Ax9420t4XX\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ax9420t4XX<\/a><\/p>\n<p>\u2014 Chris Eng (@chriseng) <a href=\"https:\/\/twitter.com\/chriseng\/status\/696639450634395648?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Some pretty strong words from Veracode\u2019s Chris Eng on Reuben Paul\u2019s opening keynote presentation. If you want to check it out and judge for yourself, click the link to our Periscope in Stefan\u2019s Tweet below.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Did you know <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> is live on Periscope? <a href=\"https:\/\/t.co\/KcmvAx4DlL\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/KcmvAx4DlL<\/a> Follow along now <a href=\"https:\/\/twitter.com\/hashtag\/netsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#netsec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersecurity<\/a><\/p>\n<p>\u2014 Stefan Tanase (@stefant) <a href=\"https:\/\/twitter.com\/stefant\/status\/696650226464124928?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\u201cMagic debit card\u201d found \u2013 each time makes a cash withdraw, it\u2019s refunded immediately <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Metel?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Metel<\/a> <a href=\"https:\/\/t.co\/rh0PQbzpWw\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/rh0PQbzpWw<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696681319154249728?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>No one likes this kind of magic. The full write up on <a href=\"https:\/\/securelist.com\/blog\/research\/73638\/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks\/\" target=\"_blank\" rel=\"noopener\">Metel<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hackers Steal Money from Banks via APT-Style Attacks <a href=\"https:\/\/t.co\/GbBMtrIVEl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/GbBMtrIVEl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a><\/p>\n<p>\u2014 SecurityWeek (@SecurityWeek) <a href=\"https:\/\/twitter.com\/SecurityWeek\/status\/696749020245553152?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 8, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>More on Metel and how the hackers are stealing money.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Poseidon APT \u2013 First boutique malware from Brazil, operating since at least 2005. <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/zpGKHHpa5v\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/zpGKHHpa5v<\/a><\/p>\n<p>\u2014 Marc Rogers (@marcwrogers) <a href=\"https:\/\/twitter.com\/marcwrogers\/status\/696998709251461120?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As expected, <a href=\"https:\/\/securelist.com\/blog\/research\/73673\/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage\/\" target=\"_blank\" rel=\"noopener\">Poseidon<\/a> was a big point of discussion. The APT group has been around for at least a decade.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Encryption games here at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <br>Try to decrypt my own message I leave for you :-) <a href=\"https:\/\/t.co\/fNUecJ97WU\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/fNUecJ97WU<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/696408884353880064?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 7, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Can you decrypt the message from Dmitry? I can\u2019t so if you can, leave in the comments below.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Nice! I think this is the first time I've seen an ANALOG exploit presented, by <a href=\"https:\/\/twitter.com\/Marmusha?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Marmusha<\/a> &amp; <a href=\"https:\/\/twitter.com\/dark_k3y?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@dark_k3y<\/a> @ <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/wnym30MP5h\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/wnym30MP5h<\/a><\/p>\n<p>\u2014 Joe Fitz (@securelyfitz) <a href=\"https:\/\/twitter.com\/securelyfitz\/status\/697035009362890752?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Hiding in the analogue.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"I hate hospitals\" <a href=\"https:\/\/twitter.com\/61ack1ynx?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@61ack1ynx<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/K7PBQjKfp5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/K7PBQjKfp5<\/a><\/p>\n<p>\u2014 Andrey Nikishin (@andreynikishin) <a href=\"https:\/\/twitter.com\/andreynikishin\/status\/697020347628064769?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I am pretty sure everyone agrees with the sentiment above. For the full story on the hospital hack you can read more <a href=\"https:\/\/threatpost.com\/medical-device-health-care-security-continues-to-ail\/116228\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/hacked-hospital\/11296\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">3D printed homemade robot bartender at <a href=\"https:\/\/twitter.com\/hashtag\/thesas2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#thesas2016<\/a> <a href=\"https:\/\/t.co\/VJMhMc7Fxh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/VJMhMc7Fxh<\/a><\/p>\n<p>\u2014 Dennis (@DennisF) <a href=\"https:\/\/twitter.com\/DennisF\/status\/697047843450834944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 9, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Work hard, play hard \u2013 right? Plus who knew tech could make some tasty drinks.<\/p>\n<h3>Bonus Sunset Signoff<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Peace out Tenerife. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/1nHbnsEZPq\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/1nHbnsEZPq<\/a><\/p>\n<p>\u2014 Chris (@brokenfuses) <a href=\"https:\/\/twitter.com\/brokenfuses\/status\/697779749603713025?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3> Bonus Photos <\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"pt\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> photos <a href=\"https:\/\/t.co\/0XAz2i0fa2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/0XAz2i0fa2<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/697738750936399872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The SAS 2016 has come and gone.  Here\u2019s a look back on the top 10 Tweets from the conference to relive the magic.<\/p>\n","protected":false},"author":636,"featured_media":11302,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2684],"tags":[282,36,1410,1430,422,83],"class_list":{"0":"post-11301","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-cybersecurity","10":"tag-malware-2","11":"tag-sas-2016","12":"tag-tenerife","13":"tag-threats","14":"tag-twitter"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-top-tweets\/6694\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-top-tweets\/6763\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/sas-top-tweets\/6671\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/sas-top-tweets\/7724\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/sas-top-tweets\/7485\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/sas-top-tweets\/6993\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-top-tweets\/11301\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-top-tweets\/11301\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11301"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11301\/revisions"}],"predecessor-version":[{"id":18926,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11301\/revisions\/18926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11302"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}