In this scenario, the system sends an infected e-mail with a link to a Trojan executable. When the executable is opened, a Trojan is installed and performs a local search of secret files and sends them to the attacker by e-mail. Participants experience first-hand the entire attack chain of a successful spear-phishing campaign demonstrating a real-world example of system compromise and exfiltration of sensitive information referencing examples of high-profile attacks when spear-phishing was used include the attack on RSA, HBGary Federal and Operation Aurora (attack on Google).
Training Mission: Trojan Data Leak
11-03-2020 @ 12:00 pm - 4:00 pm
One event on 18-12-2019 at 12:00 pm
One event on 05-02-2020 at 12:00 pm
One event on 11-03-2020 at 12:00 pm