From Adversary-in-the-Middle to BEC Attacks - A Real-Life Threat Analysis
Ekoparty Security Conference via YouTube
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a detailed conference talk that examines a real-world case study of an Adversary-in-the-Middle (AitM) attack that evolved into a sophisticated Business Email Compromise (BEC) operation with data exfiltration. Delve into the technical analysis presented by D. Matos and W. Santiago Silva at Ekoparty Security Conference, where they break down the multiple stages of this complex cyber attack and demonstrate how attackers leveraged initial access to orchestrate a comprehensive breach of business systems.
Syllabus
Unveiling the Threat: From Adversary-In-The-Middle to BEC in real-life -D. Matos & W. Santiago Silva
Taught by
Ekoparty Security Conference