2020's Most Widely Used Malicious Command & Control Infrastructure

Presented by

Greg Lesnewich

About this talk

Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes "suspicious" hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you'd imagine. Fortunately, we have some fresh insight to keep you up to speed. Join Recorded Future’s world class intelligence experts in this session for an in-depth review of the findings from our recently completed research report, Adversary Infrastructure Report 2020: A Defender’s View. This will include a first-look at the novel indicators and intelligence not otherwise available in the public domain. Watch the on-demand session to get an inside look into: - Key 2020 findings related to over 10,000 unique command and control servers, across more than 80 families - Best practices for proactive detection, ongoing monitoring, and defense-in-depth approaches to adversary infrastructure - The 2021 outlook for C2s, and what you can do to stay ahead
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (2)
Subscribers (17132)
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human analysis or instant integration with existing security technology.