The Spy Who Hacked Me!

Play The Spy Who Hacked Me!
Sign in to queue


In this presentation following a corporate espionage story based on real-world incidents, the presenters walk through attack scenarios where a cyber-spy with access to nothing but the corporate Web site exploits Web vulnerabilities to piggy back into the internal network and install malware on critical components. The attackers then use this malware to steal proprietary and sensitive information, as well as launch further attacks against unpatched vulnerabilities on the internal network. The session demonstrates both traditional malware in the form of rootkits, and newer JavaScript-based backdoors and Trojan horses that can stealthily achieve their malicious end. The presenters will discuss and demonstrate the various types of new and innovative exploits that go into making such an attack successful. They will use automated attack frameworks and advanced malware tactics to demonstrate eye opening exploits. Speakers: Rudolph Araujo and Alex Smolen (session SEC365)







Right click to download this episode

The Discussion

Add Your 2 Cents