Demonstrate how open source intelligence tools can identify threat actors like the Lazarus Group, using the Ronin Bridge Hack as a real-world case study.
- SpiderFoot (OSINT scanner)
- Docker
- GitHub
- NTFY (optional alerting)
- MITRE ATT&CK + AADAPT for emulation
docker-compose -f docker/docker-compose.yaml up --builddocker exec -it spiderfoot python3 sf.py -s ronin.network -o csv -m ip,domain,whois -F output/ronin_lazarus_report.csvpython3 alerts/ntfy_alert_handler.pySee threat_emulation/ for details on MITRE and AADAPT.