Loading Events
This event has passed.

In this scenario, a Trojan-infected CD-ROM has been inserted into a Windows Machine where the malware is auto-run and loaded from the device. Once inside, the malicious Trojan connects back to a Command and Control server where commands to steal secret files and important user information are executed. Participants will learn to detect and contain the malicious outbreak in order to control further spreading of the infected files, mitigate the data exfiltration and confirm that the outbreak has been contained.

Share This Story, Choose Your Platform!