Presented by Sherri Davidoff and Ali Sawyer of @LMGsecurity



• What we'll do



Cybercriminals are taking hacking to the next level, by leveraging ever-more-sophisticated toolsets and increasingly mature techniques. Cryptocurrency mining is the latest trend for criminals, who break into servers, install miners, and use stolen PII from your databases to set up wallets for transferring funds. We’ll view a hacker’s wallet setup in action, including screenshots of the criminal’s web surfing history and falsified documents uncovered through forensic analysis. In 2018, we expect to see more dangerous types of cyber extortion, where criminals demand ransom payments not just from the hacked organization, but also clients, patients, vendors and employees. Business email compromise (BEC) will continue to remain a critical threat, as organized crime groups use increasingly sophisticated tactics to mine data from your email and leverage it for financial gain. Hackers are busily developing new IoT bonets, following the publication of the Mirai source code and the “success” of Reaper and Satori.



In this fast-paced talk, we’ll cover these and other high-risk developments in the cybercriminal underground. By walking through some of our recent forensic analysis, we’ll look under the hood at the strategies and attack patterns currently being leveraged by cybercriminals. Learn about the top threats and ways that you can protect your organization in 2018.



• Important to know

website: https://lmgsecurity.com/

twitter: https://twitter.com/LMGSecurity

https://twitter.com/SherriDavidoff