Get Started
Loading Events
This event has passed.

In this scenario, the system sends an infected e-mail with a link to a Trojan executable. When the executable is opened, a Trojan is installed and performs a local search of secret files and sends them to the attacker by e-mail. Participants experience first-hand the entire attack chain of a successful spear-phishing campaign demonstrating a real-world example of system compromise and exfiltration of sensitive information referencing examples of high-profile attacks when spear-phishing was used include the attack on RSA, HBGary Federal and Operation Aurora (attack on Google).

Share This Story, Choose Your Platform!

Go to Top