Adventures in the Underland: Uncommon Hacker’s Persistency Methods and Countermeasures
OnlinePersistence is one of the main aspects that hackers pay special attention to during the malware development and attack phase. The goal is very simple: to be as stealthy as possible. Usually, attackers aim to maintain the presence in the target's network by installing malware on various workstations and servers. However, the main challenge for them is that the malicious code needs to be available also after reboot, so the best solution would be to put it in a place that is not discovered by most of the monitoring tools. Sneaky, right? And when this persistency remains, the problems begin, and ransomware comes to action. Since there are so many places on Windows to stay hidden even from well-known monitoring tools, it would be great to become familiar with at least some of them, especially the uncommon ones! During this session, Paula Januszkiewicz, CEO and Founder of CQURE, Microsoft MVP and RD, Cybersecurity expert demonstrates several less common persistence methods we all should be aware of! All the scenarios which will be shown are taken from real life, so don't miss it and leave with suggestions & ideas how to attain the next level of security in your workspaces.