Deconstructing The Cyber Kill Chain of Angler Campaign

SOURCE Boston 2016

Presented by: Artisom Holub
Date: Thursday May 19, 2016
Time: 10:00 - 10:40
Location: Library
Track: Security & Technology

In my research I try to deconstruct cyber kill chain involving one of the most notorious exploit kits used by cybercriminals - a kit Known as Angler exploit kit.

This talk will cover evolution of AEK, it's role in raising of ransomware threat, tricks used to send user web traffic to Angler landing pages, methods to deliver payloads, types of the payloads, and ways to monetize these activities. It will also cover procedures and tools that allow us at OpenDNS to proactively discover and block landing pages and mitigate the risk of infections delivered by AEK, as well as the preventative measures that end-users and systems administrators can take to mitigate their risks.

Listeners should be able to take away:

Artisom Holub

Artsiom Holub is a current Security Research Analyst on the OpenDNS Research team and freelance pentester in the past. Throughout the course of the day, I undertake roles from creating Security Threat Reports for existing and potential clients, working closely with the Customer Support Team, finding new threats and attacks, and designing tactics to track down and identify malicious actors and domains. I have undergraduate studies from National Technical University of Belarus, earning an Associate in Science degree from City College of San Francisco in Computer Networking and Information Security, and has earned various certificates along the way.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats