Loading Events
This event has passed.

Similar to Java NMS Kill, this scenario emulates a Watering-Hole attack in which the attacker sits and waits for the victim. The victim, having performed the expected action of navigating to a known, infected website enables the hacker to “eavesdrop” on all messages within the organization through the execution of a Trojan Horse. Participants will leverage their advanced analysis techniques in this complex attack to detect, analyze and stop the malicious code to minimize the attack surface and protect the organization from further compromise.

Share This Story, Choose Your Platform!