I Put a Keylogger On You, and Now You’re Mine: What Cybercriminals See When They Infect a Host with Malware

WEBINAR

I Put a Keylogger On You, and Now You're Mine

What Cybercriminals See When They Infect a Host with Malware

Webinar - Malware - Value of an Infected User

Emotions about the global pandemic are running high, and attackers are taking advantage. Researchers have observed criminals spreading malware by impersonating official sources, distributing malicious COVID-19 maps and trackers, and malvertising on coronavirus-related news stories.

As security professionals, we try to protect our users from this type of activity by searching for indicators of compromise and writing rules to detect malicious activity. What we don’t see is the criminal perspective – what an attacker actually sees when they infect a host with malware that has keylogging and remote access capabilities.

In this webinar, SpyCloud Head of Product Strategy Chip Witt opens a window into the criminal ecosystem surrounding credential-stealing malware like Azorult, Raccoon, Predator, and Vidar. Chip shares examples of actual malware logs, explains how various actors profit from stolen data, and discusses what you can do to better protect your enterprise from these types of threats.

View this on-demand webinar to learn:

  • How criminals distribute credential-stealing malware to victims, monetize stolen information, and continue to profit from infected hosts
  • What an attacker managing a malware campaign sees as new systems become infected
  • What’s included within malware log files, from cryptocurrency wallet details to photos of victims’ desktops
  • How you can better equip your security organization to handle these threats

Contact us to see your infected user data

Computer infected with malware

Exposed credentials, whether stolen in a data breach or via a botnet infection, put user accounts at risk of account takeover. Let’s deep dive on the data we have collected for your domain.

Get in Touch

Watch the Webinar:

I Put a Keylogger on You, and Now You’re Mine

Presenter Info

Chip Witt, Head of Product Strategy

Chip Witt has nearly twenty years of diverse technology experience, including product management and operations leadership roles at Hewlett Packard Enterprise, Webroot, VMware, Alcatel, and Appthority. He is currently the Head of Product Strategy and manages the Customer Success Program at SpyCloud, which provides cloud-based security services to help businesses of all sizes prevent data breaches and account takeover attacks by alerting when employee or company assets have been compromised. Chip works closely with field intelligence teams specializing in OSINT and HUMINT tradecraft, actor attribution and underground monitoring.

A few of our happy customers:

Related Resources

The SpyCloud Difference

Current, Relevant, Truly Actionable Data

SpyCloud’s account takeover prevention and fraud investigation solutions are backed by the world’s most current and comprehensive repository of recovered stolen credentials and PII. More data, particularly plaintext passwords, means more matches and stronger account protection.

SpyCloud human intelligence researchers have recovered billions of data breach assets, including stolen passwords and emails that can put enterprises at risk of account takeover

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Hard Truths About ATO & Strategies To Defend Your Enterprise

WEBINAR

Hard Truths About ATO & Strategies To Defend Your Enterprise

Protecting your enterprise from breaches and account takeovers has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks that put your organization at risk. According to the 2019 Verizon Breach Report, stolen credentials are the leading attack vector — yet in a recent study by Symantec, only 7% of respondents rated account takeover as a top threat to their cloud infrastructure.

Regardless of the thoughtful measures and policies you have in place, the hard truth is that no policy can protect you from human behavior. In this webinar, SpyCloud Head of Product Strategy Chip Witt demonstrates how malicious actors take advantage of loopholes in your account takeover prevention plans. For example, your employees may be reusing compromised passwords to access corporate systems or signing up for 3rd party services like LinkedIn or Fantasy Football using their work credentials.

View this on-demand webinar to learn:

  • The anatomy of an account takeover attack
  • Real-world examples of how employee password reuse can threaten your enterprise
  • Potential holes in your account takeover plan
  • What you can do to strengthen your security posture, including alignment to NIST

Solution: Account Takeover Prevention

Reset stolen passwords before criminals can use them To defraud your users or access sensitive corporate data.

Learn More

Watch the Webinar:

Hard Truths About ATO & Strategies To Defend Your Enterprise​

Presenter Info

Chip Witt, Head of Product Strategy

Chip Witt has nearly twenty years of diverse technology experience, including product management and operations leadership roles at Hewlett Packard Enterprise, Webroot, VMware, Alcatel, and Appthority. He is currently the Head of Product Strategy and manages the Customer Success Program at SpyCloud, which provides cloud-based security services to help businesses of all sizes prevent data breaches and account takeover attacks by alerting when employee or company assets have been compromised. Chip works closely with field intelligence teams specializing in OSINT and HUMINT tradecraft, actor attribution and underground monitoring.

A few of our happy customers:

Related Resources

The SpyCloud Difference

Current, Relevant, Truly Actionable Data

SpyCloud’s account takeover prevention and fraud investigation solutions are backed by the world’s most current and comprehensive repository of recovered stolen credentials and PII. More data, particularly plaintext passwords, means more matches and stronger account protection.

SpyCloud human intelligence researchers have recovered billions of data breach assets, including stolen passwords and emails that can put enterprises at risk of account takeover

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Understanding the Underground Market for Stolen Credentials

REPORT

Understanding the Underground Market for Stolen Credentials

Account Takeover & the Darknet

Even after the fall of the large darknet markets, such as Hansa and AlphaBay, there still exists a sophisticated underground ecosystem that thrives upon the sale and trade of stolen credentials. The fall of these markets represented a paradigm shift in how credentials are bought and sold on the underground. Phishing and spear-phishing attacks are becoming increasingly sophisticated and that’s just the tip of the iceberg.

Download this SpyCloud report o read our experts’ breakdown of how the underground market operates, how it is changing, and what can be done to protect you and your company.

Download the Report:

Understanding the Underground Market for Stolen Credentials​

A few of our happy customers:

Related Resources

The SpyCloud Difference

Current, Relevant, Truly Actionable Data

SpyCloud’s account takeover prevention and fraud investigation solutions are backed by the world’s most current and comprehensive repository of recovered stolen credentials and PII. More data, particularly plaintext passwords, means more matches and stronger account protection.

SpyCloud human intelligence researchers have recovered billions of data breach assets, including stolen passwords and emails that can put enterprises at risk of account takeover

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

How Easy Is It To Bypass Multi-Factor Authentication Solutions?

WEBINAR

How Easy Is It To Bypass Multi-Factor Authentication Solutions?

Enterprises are trying everything they can to prevent cyber criminals from taking over employee and customer accounts to gain access to data and systems. One security control they believe provides protection is multi-factor authentication (MFA). While MFA does provide an additional layer of security, threat actors have figured out how to bypass it using a few clever tactics.

So how easy is it to get around your multi-factor authentication solutions? Watch this on-demand webinar and learn the most common methods that threat actors are using to bypass MFA so you can implement stronger safeguards to protect your employees and customers from account takeover.

In this webinar you will learn about:

  • The most commonly used MFA bypass techniques
  • How each technique exploits the vulnerabilities of MFA

Solution: Account Takeover Prevention

Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.

Learn More

Watch the Webinar:

How Easy Is It To Bypass Multi-Factor Authentication Solutions?

Presenter Info

Jason Lancaster, Head of Investigations

ason began his career performing pen testing, designing and implementing secure network infrastructures. First as a government contractor and then at a Fortune 500 healthcare company. In 2003, he joined TippingPoint where he held several roles including SE Director. TippingPoint was acquired by 3Com in 2005 and later by HP in 2010.

At HP, Jason ran a cross-functional team as Director with the Office of Advanced Technology. In 2013, Jason co-founded HP Field Intelligence, as part of the Security Research organization, delivering actionable threat intelligence to a wide audience.

Jason spent 15 months at a cloud security start-up CloudPassage prior to joining SpyCloud where he leads the Investigations team.

A few of our happy customers:

Related Resources

The SpyCloud Difference

Current, Relevant, Truly Actionable Data

SpyCloud’s account takeover prevention and fraud investigation solutions are backed by the world’s most current and comprehensive repository of recovered stolen credentials and PII. More data, particularly plaintext passwords, means more matches and stronger account protection.

SpyCloud human intelligence researchers have recovered billions of data breach assets, including stolen passwords and emails that can put enterprises at risk of account takeover

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.