A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques - Allan Liska SecureWV/Hack3rcon 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques
Allan Liska
Missing Audio At End, Sorry
SecureWV/Hack3rcon 2018

When the last generation of Ransomware took organizations by surprise the malware was generally unsophisticated but effective. Designed for “smash-and-grab” type of attacks. The security community quickly adjusted to these attacks, so the attackers had to adapt. The new generation of Ransomware campaigns have been much more effective. The attackers have adopted nation state techniques that allow the attackers to effectively cripple large organizations in order to extract their ransom. This talk will review the tactics that the teams behind SamSam and BitPaymer have adopted and how organizations can protect themselves against these threats.

Allan Liska is an intelligence analyst at Recorded Future. Allan has more than 15 years’ experience in information security and has worked as both a blue teamer and a red teamer for the intelligence community and the private sector. Allan has helped countless organizations improve their security posture using more effective and integrated intelligence. Allan is also one of the organizers of BSides Bordeaux and has presented at security conferences around the world on a variety of topics. He is the author of:

* The Practice of Network Security
* Building an Intelligence-Led Security Program
* Securing NTP: A Quickstart Guide
* DNS Security: Defending the Domain Name System (co-author)
* Ransomware: Defending Against Digital Extortion (co-author)

Back to SecureWV 2017 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast