Friday 2 October 11:30 - 12:00, Red room
Kalpesh Mantri (Quick Heal)
2019, as has been the case in the recent past, was again full of new malware campaigns and APT attack discoveries. Some were discovered for the first time, while many others made a comeback. We have been tracking such attacks for several years and have observed a variety of techniques being used in them.
In this talk we will share a few highly sophisticated techniques used by attackers that have helped the attacks to stay undetected for years. These techniques are not very prevalent at this point; however, we suspect more and more attacks to adopt them in the future.
This paper will focus on some highly sophisticated techniques used in malware campaigns and APTs in 2019. In this talk I will discuss the following techniques/attacks:
During the talk, I will share insights on the techniques used in these attacks and will discuss the questions called out above. This paper’s intent is to bring these sophisticated techniques to defenders’ attention so that we all can work on proactively blocking attacks that use them.
Kalpesh Manti Kalpesh Manti currently works on hunting APTs and improving EDR products for Quick Heal Security-labs. Kalpesh has more than seven years of experience in the malware reversing and threat hunting domain. He has spoken at security conferences including AVAR and CARO. Previously he worked for Intel Security Labs (now McAfee) and in the Microsoft Windows Defender team. |