Similar
to Java NMS Kill, this scenario emulates a Watering-Hole attack in which the
attacker sits and waits for the victim. The victim, having performed the
expected action of navigating to a known, infected website enables the hacker
to “eavesdrop” on all messages within the organization through the execution
of a Trojan Horse. Participants will leverage their advanced analysis
techniques in this complex attack to detect, analyze and stop the malicious
code to minimize the attack surface and protect the organization from further
compromise. |