Emotet Exposed: Inside the Cybercriminals’ Supply Chain



In a new analysis, we will delve deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery mechanism’s malicious components and modules, its execution chains and its software development lifecycle.


This webcast will reveal key findings and takeaways from our researchers, who were able to bypass anti-analysis techniques to map Emotet’s dynamic infrastructure. This presentation will reveal:
 

  • A review of Emotet’s infection chain process, along with its TTPs and IOCs. Plus, similarity metrics that allow for the clustering of similar infection techniques
  • An inside look at Emotet’s command-and-control network infrastructure, and its AGILE-like software development life cycle 
  • How to create Emotet sock puppets for fetching modules and extracting its recently updated configuration 
  • An analysis of two recently updated modules that differ from previous Emotet attacks – one that steals credit card info from users of Google Chrome and one that exploits the SMB protocol to proliferate 
  • Tips and recommendations for mounting a more ironclad defense

Speaker and Presenter Information

Giovanni Vigna, Sr. Director Threat Intelligence, VMware
 
Stefano Ortolani, Staff Engineer 2, Threat Research Lead, VMware

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, Jan 19, 2023, 9:00am - 10:00am PT


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
VMware


Contact Event Organizer



Return to search results