| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This presentation is the culmination of research and execution into the emerging attack path of ad-based malware? delivery. I'll cover the basics of social and web based marketing strategies and their relationship with advanced malware campaigns currently in the wild. I'll then dive into the mechanics of running a campaign, big-data analytics, OSINT, targeting, research, and my crack at *legally* performing malvertizing. This look at this up-and-coming attack vector will show how ad-based malware is circumventing thousands spent on security appliances geared towards standard email attacks, all while abusing the implied trust of social media to go after the real end point, “the user”.
House Version
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast