Target Ransom & Malware Steal caused great damage. Do you know that the current Target Ransom & Malware combines those famous technologies? How does File-less attack actually work and is difficult to defend? How to use Epplus to evade security protection mechanisms, trick users into executing malicious programs, and steal data? How to make the OS whitelist program used by stealers to kill anti-virus and destroy the backup security mechanism? How to use the OS whitelist procedure to download malicious programs remotely? Through the use of DLL injection to achieve penetration. The above items will be the focus of this seesoin’s technical display. Our team analyzed more than 500 research results sharing of the well-known Ransom & Malware. And get the relevant technical grouping and possible protection models. Make it a good process for checking, analyzing and verifying effectiveness in an IT environment that does not have tools, and reduce the chance of data theft and blackmail.
Assistant Manager of the Information Security Department of Boutique Technology. More than 5 years in the field of information security. The team studies hackers’ intrusion techniques and analyzes 500 well-known Ransom and Malware families. Use vulnerability scanning, penetration testing techniques and other methods to achieve IT system enhancement and reduce information security risks. Have ISO27001 Lead Audit, iPAS and relevant license training.
The member of FineArt IT & Security Dept.
He’s got a unique insight, cautiously explores various possibilities in the field of information security.