Главная
Study mode:
on
1
Intro
2
How it all started
3
Whats going on
4
Over the months
5
Windtail
6
Blowup
7
The Clip
8
The Rabbit Hole
9
The Script Went Cold
10
Evolution
11
Tego
12
Double IPA
13
Wind Tail
14
What is it
15
Selenium
16
Fake Search Site
17
Fake Flash Updates
18
Parking Domains
19
Sample Site
20
Sample Pages
21
Chrome Extension
22
JavaScript
23
Demo
24
Apple revoking certs
25
URL Components
26
Net Connection
27
Virus Total
28
Security API
29
Detect and Prevent
30
Attack IDs
31
Death By 1000
32
Why Care
33
Why Dont We
34
High Fidelity Indicator
35
Adobe Reader
36
Malware Tech
37
Adobe
38
Takeaways
Description:
Explore a comprehensive analysis of malware evolution and techniques in this NolaCon 2019 conference talk. Delve into the origins and progression of various malware strains, including Windtail, Blowup, and Tego. Examine the intricate methods employed by attackers, such as fake search sites, Flash updates, and Chrome extensions. Learn about the use of Selenium, JavaScript, and parking domains in malware distribution. Investigate the impact of Apple revoking certificates and the significance of URL components in identifying threats. Gain insights into detection and prevention strategies, including the use of VirusTotal and Security APIs. Understand the importance of high-fidelity indicators and the challenges posed by Adobe Reader exploits. Conclude with key takeaways to enhance your cybersecurity knowledge and defensive capabilities against evolving malware threats.

Its Malware Time - A Bar Crawl from Skunked Homebrew to Rotten Apples

Add to list
0:00 / 0:00