Join Rapid7 for this on-demand webcast focused on Solarmarker malware. In this webcast, Rapid7 Detection & Response Analyst, Adam Boretos and UIS' Nick Cavalancia will walk attendees through a deep-dive of: the current use of banking trojans like Solarmarker, the type and value of the information stolen, how these latter-stage attack methods align with MITRE, Solarmarker’s C2 communications, and a live modified version of the Solarmarker DLL in a debugger and running it through the TOR network to the C2 to see command being sent to the dropper. Adam will then turn the focus to the Jupyter Infostealer module within Solarmarker, providing a real-world look at: how Jupyter attempts to steal credentials stored within the browser and how it exfiltrates browser data over the C2 communications channel. Register to watch now!