Overview
Explore the intricacies of ransomware attacks and IoT-based DDoS threats in this comprehensive LASCON conference talk. Delve into the stages of ransomware attacks, including deployment, installation, encryption, payment, and decryption methods. Gain insights into IoT-based DDoS attacks, examining the breakdown of IoT malware and its potential for future exploitation. Learn about analysis techniques for handling each stage of these cyber threats. Discover the alarming possibility of combined ransomware and IoT attacks becoming a major future security concern. Investigate specific topics such as HDA files, social media tactics, SVG files, and the Mirai botnet. Understand the timeline of these threats and acquire practical advice on securing IoT devices and changing passwords to enhance cybersecurity.
Syllabus
Introduction
HDA Files
Alerting
Attackers
The Host
Social Media
SVG
Red Dot
Grandma
What Sam saw
Special price
Try before buy
Downloading the file
Testing the file
Fake sales reports
Words of advice
IRS Scam
Mirai
How does Mirai work
Mirai source code is public
Dying DDoS attack
Timeline
Securing IoT devices
Changing device passwords
Taught by
LASCON