Array
(
    [PHPSESSID] => 33bbb6145cbbc0f5f045fef65bf33838
    [uid] => 6cc5fd43-028a-480e-b2fd-fa582245969e
    [REQUEST_URI] => /?course=57211&route=course
)
The Modus Operandi of EV Certificates Fraudsters - Findings from the Field
Главная
Study mode:
on
1
Introduction
2
Trust Issues
3
EV Certificate Flaws
4
Companies trying to protect you
5
Evidencebased approach
6
Cybercrime ecosystem
7
Experiments
8
Survey Research
9
Observations
10
Research Team
11
Threat Intelligence
12
Market Intelligence
13
TLS Certificates
14
Certificate Authorities
15
EV Certificates are not free
16
Why are EV Certificates so valuable
17
What if you dont have a TLS Certificate
18
What the bad guys need
19
The second reason
20
EB certificates
21
EV certificates
22
Telegram
23
Website
24
DV Certificate
25
EB Certificate
26
Social Network
27
Our Website
28
Certificate of Incorporation
29
Certificate of Registration
30
Dance Number
31
CA
32
Certificate Detail
33
EV Certificate Delivery
34
EV Certificate Website
35
UK Companies House
36
Another CA
37
CA saying our request was approved
38
Remove the URL domain
39
We did it for the UK
40
Local team in the US
41
Company formation website
42
Duns number
43
Second installment
44
Long story short
45
Summary
46
Application
47
Location
48
Internet Users
49
Questions
Description:
Explore the dark web's SSL/TLS certificate marketplace and its impact on cybersecurity in this 53-minute RSA Conference talk. Delve into new research findings on the prevalence and value of encryption certificates, including their availability, packaging, pricing, and purchasing processes. Gain insights into how cybercriminals exploit these certificates for attacks, and understand the established marketplace enabling such activities. Examine evidence-based approaches, cybercrime ecosystems, and experiments conducted to uncover these threats. Learn about the specific vulnerabilities of EV (Extended Validation) certificates and the methods fraudsters use to obtain them. Discover the intricate details of certificate authorities, the value of different certificate types, and the step-by-step process cybercriminals follow to acquire fraudulent certificates. Suitable for those with a general understanding of encryption's role in security and privacy, and the use of SSL/TLS certificates.

The Modus Operandi of EV Certificates Fraudsters - Findings from the Field

RSA Conference
Add to list
00:00
53:00