Threat actors spend many hours inside corporate networks before going for the kill. Often, they collaborate behind the scenes, figure out what's everyone's role in their upcoming attack, share expertise and negotiate with each other about the future revenue. Many attacks go undetected until ransomware encrypts their systems or the threat actors sell the data on underground markets. Despite recent takedowns of various marketplaces by law-enforcement, hackers still continue to find vulnerable applications, services, and other vulnerable initial access vectors and exploit them for their purposes.
The session will showcase how hackers enumerate environments and launch attacks against their targets to infiltrate organizations, steal intellectual property and carry out additional attacks.