Leave no traces behind- D. B. Cooper in the digital age [IBM]
ฝัง
- เผยแพร่เมื่อ 2 ม.ค. 2025
- Leave no traces behind- D. B. Cooper in the digital age
One of the most powerful attack types modular banking malware carries out is web injections. Web injections manipulate users in real time, tricking them into playing along with the attacker’s schemes. Analyzing web injections is notoriously a way to warn banks and help protect their customers. Malware authors go to great lengths to hide their injections, fetch them in real time, and lately - deleting them entirely as a way of hiding their content and for wiping traces. Is this the end of the road for researchers looking into injections for important clues?
This brief technical session will prove that malware can run but it can’t hide. Going head-to-head with attackers means coming up with new and ingenious ways to detect attacks and stop malware in its tracks, and we will cover a special case study that you won’t want to miss.
:: :: :: :: :: :: :: :: :: :: :: :: :: :: ::
Estie Rubinstein, FraudCon virtual track at IBM
Estie Rubinstein is a web researcher in the Cybersecurity research group at IBM Trusteer Labs. In her role, she focuses on malware analysis, device identification, incident response, and researching cutting-edge features. She previously worked as a security content developer protecting web application users from financial fraud. Moreover, Estie is a lecturer in the “Cyber School” project, where she teaches and mentors children looking to step into the cyber world. She is passionate about learning new things every day, reaching new heights, and sharing her findings in the cybersecurity arena.