From Adversary-in-the-Middle to BEC Attacks - A Real-Life Threat Analysis
Ekoparty Security Conference via YouTube
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a detailed conference talk that examines a real-world case study of an Adversary-in-the-Middle (AitM) attack that evolved into a sophisticated Business Email Compromise (BEC) operation with data exfiltration. Delve into the technical analysis presented by D. Matos and W. Santiago Silva at Ekoparty Security Conference, where they break down the multiple stages of this complex cyber attack and demonstrate how attackers leveraged initial access to orchestrate a comprehensive breach of business systems.
Syllabus
Unveiling the Threat: From Adversary-In-The-Middle to BEC in real-life -D. Matos & W. Santiago Silva
Taught by
Ekoparty Security Conference