Deconstructing The Cyber Kill Chain of Angler Campaign

In my research I try to deconstruct cyber kill chain involving one of the most notorious exploit kits used by cybercriminals - a kit Known as Angler exploit kit.

This talk will cover evolution of AEK, it's role in raising of ransomware threat, tricks used to send user web traffic to Angler landing pages, methods to deliver payloads, types of the payloads, and ways to monetize these activities. It will also cover procedures and tools that allow us at OpenDNS to proactively discover and block landing pages and mitigate the risk of infections delivered by AEK, as well as the preventative measures that end-users and systems administrators can take to mitigate their risks.

Listeners should be able to take away:

  • Get an overview of Cyber Kill Chain that involves AEK
  • Understand the evolution of AEK and how it works
  • An overview of different generations of AEK
  • An understanding of different infection mechanisms and how to mitigate them How to monitor network traffic for possible Indicators of Compromise (IoCs)

Presented by