Skip to content
Get a Demo
    curve design on left cloud image

    Uncovering Threats with Cado Security: Highlights from the October 30th CTF

    On October 30th, Cado Security hosted an engaging Capture the Flag (CTF) event, offering cybersecurity professionals an opportunity to experience the Cado platform in action. This event was centered on DIICOT, an emerging Romanian threat actor, which was previously investigated by Cado Security Labs. This CTF provided participants with real-life samples based on Cado Labs' latest research, allowing them to see first hand how the platform simplifies complex forensic investigations in cloud environments.

    DIICOT: An Emerging Threat in Focus

    Example modified UPX header from DIICOT campaign

    DIICOT represents a rising challenge in cybersecurity. Through Cado Labs’ research, the October CTF featured samples from DIICOT’s activity, helping participants explore realistic attack patterns and tactics. This setup allowed them to directly engage with real-world threat scenarios and understand the unique forensic challenges posed by cloud-based threats.

    Exploring the Cado Platform: Real-World Threats, Real-Time Analysis

    The event started with an overview of the Cado platform’s core features, followed by a hands-on demonstration. Participants were then given access to the Cado platform to investigate the CTF’s DIICOT-themed challenges. By using the platform’s powerful analysis capabilities, participants uncovered indicators of compromise, tracked tactics used by DIICOT, and experienced how the Cado platform supports fast, efficient investigations.


    The Cado Platform

    Throughout the session, the Cado team was on hand to provide support, offer guidance on the platform’s advanced forensic capabilities, and address any participant questions. This CTF was an opportunity for participants to see how the Cado platform works with real-life threat data, showcasing how it can streamline investigations and enable teams to respond to advanced threats in cloud environments, asking questions such as:

    • Where were the additional payloads saved?
    • What MITRE ATT&CK Defense Evasion techniques were used?
    • What is the domain name of the Voice/Communications platform used for C2?

    Key Insights and Looking Ahead

    This CTF underscored Cado Security’s goal to empower cybersecurity professionals with tools that adapt to the demands of modern threat landscapes. Allowing participants to better understand the cloud-native forensic capabilities essential for tackling today’s advanced threats. The DIICOT-themed challenges allowed attendees to experience the Cado platform’s effectiveness in handling complex threat scenarios, showing the role it can play in enhancing forensic analysis for cloud security.

    See the Cado Platform in Action

    With one more CTF scheduled for the year, on December 5, Cado Security will continue offering hands-on experiences for those interested in exploring advanced cloud forensics. Interested in seeing how the Cado platform can enhance your team’s threat investigations? Request a demo to see it in action.



    Tag(s): Event Recap

    More from the blog

    View All Posts