About this event
A few months ago, the Snowflake breach shone a light on the threats posed by infostealers. In it, 80% of the credentials used were seen in infostealer infections dating back to 2020. Naturally, the fact that the credentials that facilitated one of the largest breaches in history were just sitting around on the internet is seriously alarming.
Attackers are also increasingly using infostealers to steal authenticated user sessions, bypass MFA and take over corporate accounts. From there, they can access and steal sensitive data, take over critical functionality, and pivot to conduct more traditional attacks like deploying ransomware.
Join Luke Jennings, VP R&D at Push Security, as he rolls up his sleeves to demonstrate:
Luke will showcase a range of tools to show what infostealers actually do when they run on your machine, and break down how stolen data can be used to target downstream apps and services.
He’ll also take you through the key families of infostealers as well as open source examples to demonstrate how they work under the hood – and explore if it really is that easy to use a stolen session cookie to hijack a session after all!
Hosted by
Push stops identity-based attacks. A browser-based agent observes identities as employees use or create them and generates a unique telemetry source that can be viewed in the Push platform or forwarded to SIEM/SOAR.