Risks of Identity and Credential based Cyber Attacks
Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop and discovered the evidence left behind to uncover the attack path and the techniques used. In this session, I will cover a real-world ransomware incident response showing the techniques used by the attackers. Discovering it was part of a Ransomware as a Service (RaaS) variant. The evidence left behind and understanding the techniques used and why.
Joseph Carson, Chief Security Scientist & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging ransomware attack. Joe will look at tools and techniques cyber criminals use to hack into endpoints, RDP Brute Force, Mimikatz, and Responder, and the paths attacker can take toward your enterprise infrastructure and data. Joe will walk through the attack, step-by-step, showing:
- How attackers gained access to systems and patient zero
- Established staging, footholds, and persistence
- What tools were used
- What commands were executed
- How the ransomware was delivered
- How AD elevation was achieved
In this webinar you will learn how you can avoid becoming the next victim and the lessons learned.