Overview
Explore advanced fraud techniques and countermeasures in this 40-minute RSA Conference talk. Delve into how adversaries exploit digital transformation to automate credential theft and account takeovers on an unprecedented scale. Learn about sophisticated attack tactics, including fishing, SSL certificate manipulation, and session randomization. Discover new delivery methods and anti-research techniques employed by cybercriminals. Examine real-world examples of Instagram phishing, mobile emulator exploitation, and device fingerprint spoofing. Understand the role of artificial intelligence in modern phishing attacks. Gain valuable insights on protecting against these evolving threats and implementing effective security measures to safeguard digital assets and user accounts.
Syllabus
Introduction
Agenda
Digital Transformation
New Targets
Attack Tactics
Fishing
SSL Certificates
Session Randomization Folders
New Delivery Methods
AntiResearch Techniques
Session Protection Techniques
Blocked AP List
Reverse Proxy Phishing
Instagram Phishing
What is Mobile Emulator
Device Fingerprint Spoofing
Example
Network Connection
Scripts
Second Factor Authentication
Transfer of Funds
Artificial Intelligence
Phishing
What you need to do
Thank you
Taught by
RSA Conference