Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We...

83
THE RANSOMWARE ODYSSEY: Their Relevance and Their Kryptonite

Transcript of Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We...

Page 1: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

THE RANSOMWARE ODYSSEY:

Their Relevanceand

Their Kryptonite

Page 2: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Before We Begin

Page 3: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 4: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 5: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 6: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

IR Daily Attention Arbitrage

Page 7: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

A New Wave of AttacksInfected victims send out scans looking for other windows PC’s on the local network, propagating the worm.

The exploit WannaCry uses were created by the NSA [SMB Vuln], a patch was released by Microsoft

The AES key is encrypted using infection specific public key generated, the Master Key is needed to decrypt the file, currently only the public part has been analysis

WannaCry tries to load an infection specific public key “00000000.pky” if it doesn’t exist, WannaCry uses“CryptoGenKey” to create a keypair

Double Pulsar/Eternal Blue reportedly developed by NSA, leaked by Shadowbrokers and exploited by Wannacry 2 months later. RCE type issues need expedited patch processes.

Page 8: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

The Game is Changing

Page 9: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Downloadable Ransomware• https://github.com/mauri870/ransomware• https://github.com/goliate/hidden-tear• https://github.com/roothaxor/Ransom• https://github.com/bitdust/WamaCry

Page 10: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Ransomware Evolution

•Cryptowall

•CBT locker

•Cryptographic Locker

2014

•TorrentLocker.

•BandarChor.

•New family Teslacrypt

•RaaS :

•TOX.

•Fakben

•Radamant

•Chimera

2015 •Locky

•Zepto

•Keranger (1st targeting OS X)

•Cerber

•Petya (Super ransomware)*

•SAMAS

•Maktub (nicely graphic design)

•Jigsaw

2016

•Philadelphia

•Cerber

•Wannacry

•Spora

•Sage

2017

Image 1. Ransomware evolution from 2014 to 2016

Own design for training Purposes

Page 11: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Phishing emails

Web based attacks

• Drive by downloads /Exploits Kits (malvertising)

• Jboss (Samas), wordpress, Joomla

Attack vectors

Page 12: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

I got an email from Nigeria?

Page 13: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Cerber• Subject “21735 Ssuitemangun”

Page 14: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Processes in the background

• Zip file contains “js” file

• Loads • wscript.exe,schtasks.exe

• svchost.exe• taskeng.exe

• Temporal file "iy0sz7tth.exe"

Page 15: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Location

• Under C:\Users\USERID\AppData\Local\Temp

• Later on we see taskeng.exe making reference to the temp file

Page 16: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

All files encrypted

Page 17: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Captcha???• Payment: hxxp://p27dokhpz2n7nvgr.onion/7A25-8009-CEE7-0091-C5C7

Page 18: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Here comes the nightmare!

Page 19: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 20: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

1 day later…

Page 21: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Behind the scenes snfE021.tmp• Temporary file call: snfE021.tmp

Page 22: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Malicious domain• DGA domain

hxxp://sedwrfaawsa4.xyz/search.php

Page 23: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Behind the scenes yv4msi53p.exe

Page 24: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 25: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Dependency walker

Page 26: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Angler

Crypwall

Cryptesla

Crilock

• Ottawa Hospital

Rig

Crypwall

Cryptesla

Waltrix

Cerber

Locky

Neutrino

Crypwall

Cryptesla

Crypctb

Crypshed

Locky

Nuclear

Crypwall

Cryptesla

Cerber

Exploits Kits

Page 27: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Cerber

Sundown EK

ElTest script from compromised website

Sundown EK “Eltest Campaign”

Page 28: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Activa Clinics

Page 29: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

PCAP traffic

Page 30: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Ransomware Variants

•Petya/misha (MFT)Normal

•Power-shell (powerware)

File less ransomware

•Stampado

•Philadelphia

•Commodity ransomware

•Spora

RaaS

Page 31: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Philadelphia or Stampado

Page 32: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Tall, dark and ransom

SAMAS

Wannacry

Philadelphia

Page 33: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 34: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Up to $500 $501 to $1000 $1001 to $5000 $5001 to $10 000 $10 001 to $50 000 $50 000 to $150000

Greater than $150000

30%

22%20%

11%12%

3% 3%

AMOUNTS DEMANDED BY RANSOMWARE PERPETRATORS IN USA

Page 35: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Back up!

Block macros

Filter attachment

Disable WSH

Email sandboxing

Proxy Gateway

Email protection

Hasta la vista, Ransomware!

Page 36: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Latch ARW.

Page 37: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Can we ever win the fight against ransomware?

Ransomware Voldy

INFOSEC around the world

Page 38: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Truth must be told….

…we are all out of jobs without them.

Page 39: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Threat Intelligence for Ransomware

Page 40: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What Are We Up Against?

Jigsaw

• Deletes files periodically until ransom is paid

• Demands $150 in BTC

• Can potentially be purchased on dark web

KillDisk

• Linux Variant

• Demands that user pays 222 bitcoin

• Does not store decryption keys (bye bye data)

Page 41: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What Are We Up Against?

Page 42: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What’s Under The Hood?

• Encryption Functions• Searches for file extensions

• Leveraging open encryption standards

• %UserProfile%\AppData\Roaming\System32Work\EncryptedFileList.txt

• Persistence Functions• Add registry key

• HKCU\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe%UserProfile%\AppData\Roaming\Frfx\firefox.exe

• Add to autorun list

• Delete 1k files of encrypted files on startup

Page 43: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What Are We Up Against?

Jigsaw

• Demands $150 in BTC

• Deletes files periodically until ransom is paid

• Can potentially be purchased on dark web

KillDisk

• Windows and Linux Variant

• Demands that user pays 222 bitcoin

• Does not store decryption keys (bye bye data)

Page 44: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What Are We Up Against?

Page 45: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

What’s Under The Hood? (Linux variant)• Encryption Functions

• Recursively traverses the root directory up to 17 subdirectories deep

• Files encrypted using Triple-DES

• Encrypts each file with a unique set of encryption keys

• Persistence Functions• Overwrites bootloader entry

• GRUB displays ransom message

Page 46: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Ransomware Kill Chain

Executable Delivery

Executable Installation

C2 Key Exchange

File Encryption

Ransom

Page 47: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

Analytical Engine

Threat Intelligence

Platform

Threat Intelligence

Feeds

Logs

IncidentResponse Ticketing System

IncidentResponse Produced

Intelligence

NetworkDevices and Appliances

Page 48: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

• Ingest open source feeds and ensure all data types are being collected

• Leverage existing security architecture to feed existing threat intel platform and analytical processes

• Create custom analytics to make intelligence actionable

• Incident response playbooks that cover feeding intelligence back into platform

Page 49: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

Analytical Engine

Threat Intelligence

Platform

Threat Intelligence

Feeds

Logs

IncidentResponse Ticketing System

IncidentResponse Produced

Intelligence

NetworkDevices and Appliances

Page 50: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Rating Your Threat Intel Feeds

Page 51: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

Analytical Engine

Threat Intelligence

Platform

Threat Intelligence

Feeds

Logs

IncidentResponse Ticketing System

IncidentResponse Produced

Intelligence

NetworkDevices and Appliances

Page 52: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

To Build or Not To Build

Page 53: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

Analytical Engine

Threat Intelligence

Platform

Threat Intelligence

Feeds

Logs

IncidentResponse Ticketing System

IncidentResponse Produced

Intelligence

NetworkDevices and Appliances

Page 54: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Analytic Engine

Alert

Analyst Feedback

IOCs

Logs

Page 55: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Creating Analytics

• Email:• Blacklist To/From sender and IP Address

• Total IOC score from all threat sources weighted on confidence from each source

• Network Communications:• Blacklist Network IOCs

• Total IOC score from all threat sources weighted on confidence from each source

• Anomalous HTTP/DNS Detection (Payload size, Frequency Extraction, DGA)

• Endpoint• Blacklist File Extensions

• YARA

• Rapid attempts to create, modify, and access files

Page 56: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Collect, Detect, Respond

Analytical Engine

Threat Intelligence

Platform

Threat Intelligence

Feeds

Logs

IncidentResponse Ticketing System

IncidentResponse Produced

Intelligence

NetworkDevices and Appliances

Page 57: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Creating Playbooks• Determine Ransomware Infection

• If device is infected, is it ransomware?

• Investigate Infection Delivery• Email, exploit kit, ect..• Search for other malicious artifacts

• Scope Incident• Identify malicious binary• Identify encrypted or ransomed files

• Protect against it• UPDATE SOFTWARE• Blocking IOCs• Tuning Analytics• Security training

• Recover• Verify that infection has not spread or remains• Restore from backup if possible

Page 58: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Aftermath

Page 59: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Jan 2017

Page 60: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Motivation Behind These Attacks

Page 61: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Scanning for Misconfigurations!

Page 62: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

MongoDB Documentation (Defcon 21 -> Ming Chow)

Page 63: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Recon

2015 2017

Page 64: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Recon

Page 65: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Recon

Page 66: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Think & Act As If You’re The Attacker

Page 67: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

def attacker ():print(“Who, What, Where, Why & How”)

attacker()

My Mindset When Investigating!

Page 68: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Know Your Hackers and GroupsExpand Your Network

Page 69: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Profiling The Attackers Mindset

• You must understand the people that will go after your Company

• What do they want:

• IP?

• User Data?

• Money?

• Bragging Rights?

• Ask yourself if I was an attacker what would I go after, How would I break into the environment.

• Offensive thinking is the best Defense – A lot of the times products are not rolled out properly!

Page 70: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Going After the MongoDB

Page 71: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 72: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Finding The Right Service

Page 73: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

I didn’t see that coming

Page 74: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Building a scanner

Page 75: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Fast

Page 76: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Just Use Shodan

product:"MongoDB" country:"ru"

Page 77: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

The One Question?

Page 78: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Holding The Data Hostage

Page 79: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Harak1r1

Page 80: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Search for MongoDB ransacking Google Docs

Page 81: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Big Thanks

Page 82: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out
Page 83: Their Relevance and Their Kryptonite - FIRST · Their Relevance and Their Kryptonite. Before We Begin. IR Daily Attention Arbitrage . A New Wave of Attacks Infected victims send out

Any questions?