A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Emotet - Banking Malware With A Bite - Bradley Duncan BSides Columbus Ohio 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

Emotet - Banking Malware With A Bite
Bradley Duncan
BSides Columbus Ohio 2018

Of many threats in today's cyber landscape, banking malware has remained a constant presence. Banking malware like Emotet steals login credentials from a victim's Windows computer, and criminals use this information to empty bank accounts. As an information stealer, Emotet doesn't bark, but it sure packs a financial bite! Security researchers continue to find new samples on a near-daily basis, and victims most often receive Emotet through malicious spam. This presentation reviews Emotet banking malware, discusses its distribution methods, and illustrates how potential victims can be bitten by this information-stealing malware. The talk concludes with best practices to avoid this increasingly common threat.

After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, and he is a currently a Threat Intelligence Analyst for Palo Alto Networks Unit 42. Brad specializes in network traffic analysis. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,300 malware and pcap samples to a growing community of information security professionals.

@malware_traffic

Back to BSides Columbus Ohio 2018 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast