Hi [[ session.user.profile.firstName ]]

How RiskIQ Host Pairs Confirmed the Lazarus Group Attack on Polish Banking

In this webinar, we break down a recent string of attacks against Polish banking institutions, which share traits with the 2014 assault on Sony Corp linked to the Lazarus Group.

The example we examine reveals how this attack on the Polish Financial Supervision Authority is part of a larger international hacking effort.

We run a live investigation of the attack and discuss key learnings including how:

Host Pair data sets were crucial to confirming relationships to the KNF site that hosted the malicious iframe that pointed at two malicious URLs
RiskIQ virtual users provide an understanding of exactly what happens when a page is loaded, uncover stealthy attacks that happen behind the scenes, and speed up confirmation and mitigation of threats
Security teams can prevent and proactively investigate website compromises like this
Recorded May 2 2017 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gary Paluch Sr. Sales Engineer RiskIQ and Sam Curcuruto Sr. Product Marketer RiskIQ
Presentation preview: How RiskIQ Host Pairs Confirmed the Lazarus Group Attack on Polish Banking

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Can You Find the Threat? RiskIQ EMEA Virtual Threat Hunting Workshop Jun 24 2020 9:00 am UTC 120 mins
    Jamil Mirza, EMEA Solutions Architect, RiskIQ
    Given the current pandemic, we’ve had to cancel our planned series of physical Threat Hunting Workshops across EMEA. However, this same pandemic has expanded attack surfaces quicker and more radically than ever before and an organization’s threat hunters are now its front-line defenders against the associated spike in cyber threats.

    While we can’t see you in person we'll be running a virtual 2 hour version of our workshop to fortify your skills. This at-home live training includes brand new hands-on exercises using RiskIQ’s unique advanced data sets. We’ve designed it to introduce security analysts, incident responders, and SOC personnel to brand new methods and threat data sets that enable quicker and more thorough investigations.

    Attend and Learn:

    Methodologies for threat analysis
    How RiskIQ’s unique data sets build-out investigations more thorough investigations
    How to use RiskIQ PassiveTotal
    Use Cases – A series of hands-on Exercises and Investigations

    Date: Wednesday 25 June
    Time: 10 am BST, 11 am CEST,

    Additionally, you will receive 3 CPE credits for attending the entire workshop.
  • JavaScript Threats: A Clear and Present Danger for all Online Merchants Recorded: Jun 5 2020 42 mins
    Terry Bishop, VP Technical Services, EMEA
    JavaScript attacks are a top security concern for any organization that acts as an online merchant.

    In the overwhelming majority of JavaScript attacks, threat actors like Magecart hide credit card skimmers deep inside client-side JavaScript to capture and exfiltrate credit card and other payment data from customers. RiskIQ has detected millions of skimmers on websites across the globe, and we’re continuing to detect new ones every hour. The current pandemic has only served to fuel this growth, with newly discovered skimmers up by 30% since March.

    However, most organizations lack visibility into their web-facing assets and the way their users interact with them. As a result, JavaScript compromises can go undetected for weeks or months, damaging customer relationships, brand reputation, and potentially incurring eye-watering fines.

    The good news is that RiskIQ offers a detection solution for these types of attacks that is quick and easy to implement, requiring no agents or web site changes.

    In this webinar, we’ll cover:

    A review of JavaScript attacks and why they’re different from other types of attack
    A closer look at card skimmers and how they work
    Current tactics threat actors are using to hide their injections to avoid detection
    We’ll also show how RiskIQ can enable your organization to be proactive in protecting your customers while avoiding the consequences of large scale personal data theft.
  • 5 Questions, Answered - Vulnerability Control Beyond the Firewall Recorded: May 22 2020 50 mins
    Josh Mayfield, Vijay Punja
    Security pros are saddled with the responsibility to manage assets, count-up vulnerabilities, stack-rank priorities, and somehow figure out how to remediate exposures that are different in-kind from the typical network CVE.

    But there’s hope. Josh Mayfield and Vijay Punja will share how to extend vulnerability control outside the firewall, reduce scanning costs and delays, and keep pace with the speed of digital growth.

    In this webinar, you will learn:

    How to prioritize external, internet-based risks
    What methods other enterprise security teams use
    Why digital threats, like malicious JavaScripts, are so tenacious
    Core questions to guide world-class vulnerability control
    Join our fireside chat, where we explore the latest trends and tactics for internet exposure and risk control.
  • Attack Surface Evolution - Digital Transformation is in Hyperdrive Recorded: May 6 2020 43 mins
    Fabian Libeau, VP EMEA, RiskIQ
    The digital revolution continues to march on, but with the outbreak of COVID-19, it has suddenly gone into hyperdrive. Almost overnight, workforces and business operations completely decentralised as work from home policies came into force.

    In the past couple weeks, security protocols have completely changed—firewalls, DLP, and network monitoring are no longer as effective as they were. Attackers now have far more access points to probe or exploit, with little-to-no security oversight. Meanwhile, IT is feverishly standing up new systems, new access, and new channels and likely succumbing to human error, such as critical misconfigurations.

    This session will take a close look at this transformation and the steps security teams need to take in these unprecedented times. Attendees will:

    Gain an understanding of the changes in the threat landscape as a result of the current pandemic, both from an attacker and defender perspective.
    Learn how you can pinpoint configuration errors, find & secure cloud assets, and detect malicious rogue assets.
    Understand the offerings RiskIQ is making freely available to the audience: COVID-19 Daily Intelligence Report, Daily Infrastructure Observations, 30 access to RiskIQ PassiveTotal and Digital Footprint Snapshots.
  • What's the difference between PassiveTotal Community and Enterprise? Recorded: Jan 8 2020 6 mins
    Vijay Punja, RiskIQ Technical Account Manager
    A look at the differences between the free to use Community Edition and PassiveTotal Enterprise Edition.
  • RiskIQ JS Threats Overview Recorded: Sep 20 2019 17 mins
    Peter Weller, EMEA Technical Account Manager
    Overview of the JS Threats solution to detect malicious JavaScript injection
  • PassiveTotal Datasets - A Closer Look Recorded: Sep 6 2019 21 mins
    David Belnick, RiskIQ EMEA Technical Account Manager
    This video explains the different datasets within PassiveTotal and how they can be used in an investigation
  • PassiveTotal Example Investigation Recorded: Aug 27 2019 20 mins
    Hiten Sharma, EMEA Technical Account Manager
    A look at PassiveTotal datasets and how they are used in an investigation.
  • Introduction to PassiveTotal Recorded: Jul 18 2019 20 mins
    Peter Weller, RiskIQ Technical Account Manager, EMEA
    This is a short overview PassiveTotal.
  • Managing Risks in your Attack Surface Recorded: Nov 8 2018 45 mins
    Terry Bishop, EMEA Technical Director, RiskIQ
    According to latest Verizon research, 73% of all breaches originate outside the corporate firewall on the Internet and your organisation's presence on the Internet has become the new cyber battlefield.. Forgotten, unmanaged and un-patched web infrastructure have long been targets of choice for cyber criminals but recently we’ve seen new and effective tactics designed to compromise organisations, employees and customers while avoiding detection with traditional security methods and tooling. In this webinar we’ll look at how the cyber battlefield is changing in favour of the adversary and we’ll outline the steps organisations need to take to regain control and reduce their Internet exposure.
  • Inside and beyond BA and Ticketmaster - the many breaches of Magecart Recorded: Oct 12 2018 54 mins
    Yonathan Klijnsma, RiskIQ
    In 2015 a digital credit card skimming group that injected code into the online shopping software provided by Magento, dubbed ‘Magecart’ was first discovered by RiskIQ in 2015. In October of 2017 RiskIQ exposed the group’s offline operations, which monetizes its credit card theft and mitigates risk to its members by recruiting unwitting mules in the US via Russian-language job postings to ship stolen goods to Eastern Europe.

    RiskIQ then discovered the July breach of Ticketmaster was not an isolated incident as initially reported, but rather part of a worldwide campaign affecting potentially thousands of sites by hacking third-party components used by e-commerce brands. The latest chapter in the Magecart saga reveals the group’s role in the targeted breach of British Airways, which used malicious code meant to mimic the functionality of the site to intercept the payment information of 380,000 customers.

    Join RiskIQ Researcher, Yonathan Klijnsma, to learn:

    How Magecart has continued to evolve
    What happened during the Ticketmaster breach, and what it means for hundreds of other e-commerce sites
    How British Airways was successfully targeted
    The newest research that will better define the scope of Magecart’s influence
  • Understanding the ROI of Implementing Digital Threat Management Recorded: May 17 2018 59 mins
    Jarad Carleton Industry Principal, Cybersecurity Practice – Frost & Sullivan, Sam Curcuruto Head of Product Marketing – RiskI
    The digital threat landscape moves too quickly for security teams to rely on disparate tools that slow down investigations and complicate protecting the organization. The time has come to embrace the power of a digital defense platform strategy to simultaneously reduce cost and business risk.

    In this webinar featuring Frost & Sullivan Cyber Security Industry Principal, Jarad Carleton, we’ll cover:

    How organizations should be leveraging “force multiplier’ platform technologies that provide unified insight and protection against threats across the Web, social media and mobile apps.
    Why a platform approach is the best way for resource-constrained information security departments to reduce both mean time to detection (MTTD) and mean time to resolution (MTTR) of digital threats.
    Customer mini-case studies that demonstrate the platform capabilities and ROI achieved.
    How the RiskIQ platform maps to the Frost & Sullivan Cyber Resilience Framework.
  • Mitigating Risk Outside the Firewall Needs a Strategy: Start with Risk Reporting Recorded: Mar 16 2018 45 mins
    Edward Amoroso – TAG Cyber Founder & CEO, Vamsi Gullapalli – RiskIQ Product Manager, Sam Curcuruto – RiskIQ Product Marketing
    For most security professionals, fixing vulnerabilities and security gaps can feel like a game of Whack-a-Mole. New threats come online; new weaknesses are exploited, old gaps are exploited, new vulnerabilities are disclosed. The process is challenging to manage and prioritise. But a strategy that includes automated, up-to-date analysis of your security posture, especially as it relates to internet-exposed assets can help calm the storm.

    In this webinar, we cover how a CISO professional looks at risk as it relates to your digital footprint, and how RiskIQ’s Risk Reporting is different from other Risk Scoring and Risk Reporting solutions. We also cover essential perspectives, methods, and capabilities that are important for any digital threat management programme.

    Join us for our webinar to learn more from Edward Amoroso, former CISO of AT&T and current CEO of TAG Cyber as he offers his advice on a comprehensive Outside the Firewall strategy.
  • Understanding and Taking Action on Risk Associated with your Digital Footprint Recorded: Mar 9 2018 28 mins
    Dustin Wilcox, 360Velocity | Vamsi Gullapalli, RiskIQ
    Visualising your organisation’s complete attack surface—all the known, unknown, and rogue and phoney digital assets across digital channels—is central to a robust and effective digital threat management (DTM) program. Having this complete picture also provides an understanding of vulnerabilities associated with those assets, and which should be prioritized highest (e.g., old vulnerabilities, which are the most often exploited, and new vulnerabilities like zero-days).

    During its discovery process, RiskIQ’s Digital Footprint surveys the entire internet, looking for digital assets that belong to or are connected to you, across the web, social, and mobile channels. Register for our upcoming webinar with RiskIQ’s Digital Footprint Product Manager, Vamsi Gullapalli, where he discusses:

    - What is RiskIQ Digital Footprint?
    - Where it fits in your security stack
    - How it can improve your vulnerability and asset management processes by making them more complete and up-to-date
    - Real life uses cases from customers who have improved their security posture and digital threat management programs with RiskIQ

    Also, you’ll hear from a RiskIQ customer and security chief on how he used Digital Footprint to improve his organisation’s risk posture.
  • Understanding your Attack Surface - Research into FT30 organisations Recorded: Nov 21 2017 37 mins
    Terry Bishop, EMEA Technical Director, RiskIQ
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actors and an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • Collecting Personal Information Securely? If not time is running out. Recorded: Oct 19 2017 32 mins
    Jay Huff, Hiten Sharma
    The care and handling of personal information is a top concern for consumers and governments alike. Unlike many issues which gain public attention and struggle to keep it, an endless stream of publicised data breaches serves to keep data privacy in the public eye. As a result we’re seeing increasingly onerous regulation coming into effect in an effort to improve the data management practices of organisations and protect the confidential information of citizens. Major Internet players are also weighing in in an effort to make the user experience more secure.

    For organisations with a large digital presence, identifying all the places that personal information, or in the case of GDPR, personally identifiable information, is collected can be a daunting task. Are those forms collecting data securely? Are they accompanied by compliant statements and controls? Research carried out by RiskIQ suggests that there is much more to do in this area.

    Join us for a closer look at the security and compliance issues surrounding the collection of personal information on the Internet and learn how you can automatically discover and assess all forms and persistent cookies across your web presence.
  • SANS & RiskIQ – Putting Digital Threat Investigation & Response into Hyperdrive Recorded: Aug 24 2017 61 mins
    Dave Shackleford, SANS analyst and principal consultant, Voodoo Security and Beckie Neumann, RiskIQ
    Given the innovation and dynamics of web, social and mobile attacks targeting consumers and employees alike, progressive organizations are adopting machine learning and workflow orchestration to accelerate external exploit, adversary and exposure investigation and response. Beyond threat intelligence, where can security teams further automate, integrate and coordinate resources? Join SANS expert Dave Shackleford and Beckie Neumann, technical product manager at RiskIQ, as they share techniques and technology to empower security analysts and advance digital defenses.

    Through practical use cases and real-world examples, webinar attendees will explore how to:

    Apply predictive analytics to thwart threats
    Identify complex attack surface gaps
    Expedite external to internal event triage
    Construct workflows to take down external threats
    Integrate derived threat data with SOC and GRC tools
  • NoTrove: A Deep Dive into a Scam Empire Recorded: Aug 24 2017 37 mins
    Ian Cowger, Threat Researcher, RiskIQ
    Earlier this year, RiskIQ reported an eightfold increase in internet scam incidents, which deny the $83 billion digital advertising industry millions of dollars. Since then, we’ve identified a particularly prolific threat actor that’s built out wide swaths of infrastructure to deliver millions of scam ads, threatening consumers and undermining the digital advertising industry.

    Based on the RiskIQ report released in April, NoTrove: The Threat Actor Ruling a Scam Empire, report author and RiskIQ Threat Researcher Ian Cowger and Technical Marketing Manager Benjamin Powell will walk you through how “NoTrove,” a scam actor named after its URI pattern and penchant for denying victims “troves” of rewards, uses its scam empire and advanced automation techniques to stay ahead of detection and takedown efforts.

    Watch the Threatcast™ for a deep dive on:

    How scams are becoming a lucrative and increasingly popular method for threat actors and why they’re bad news for the digital advertising ecosystem
    What the different variants of NoTrove campaigns look like—software downloads, PUP redirections, and fake rewards downloads—and what the redirection sequence looks like when victims click and are redirected to unwanted places across the internet
    How NoTrove domains are able to command so much traffic, many shoot well up into the Alexa top 10,000
    How RiskIQ’s unique machine learning technology is able to detect scams, even as threat actor tactics evolve, to enable ad networks and publishers to block NoTrove infrastructure, even as it changes, evolves, and rotates
  • What you don’t know CAN hurt you. Are you GDPR PII compliant? Recorded: Jul 11 2017 46 mins
    Bob Tarzey, Quocirca analyst and director, Fabian Libeau, RiskIQ technical director
    With GDPR fast approaching, do you know everywhere you’re collecting PII?

    The EU General Data Protection Regulation (GDPR) includes new requirements and controls on the online processing of personally identifiable information (PII) and large fines if poor practice leads to short comings in processing controls or lead to a data breach. RiskIQ’s recent research into leading UK organisations shows that there is still much to be done to comply with the regulation.

    Join us for this webinar with Bob Tarzey, Quocirca analyst and director, and Fabian Libeau, RiskIQ EMEA Technical Director. Topics covered include:

    - What are the changes to online information processing introduced by GDPR and how do they differ from current data privacy legislation?
    - What are the common issues organisations face to comply?
    - How can RiskIQ help?
    - Case Study example
  • Digital Risk Management Maturity Model Recorded: May 3 2017 52 mins
    Nick Hayes, Sr. Analyst, Forrester and Sam Curcuruto, Sr. Product Manager, RiskIQ
    How mature is your organization’s digital risk management program?

    For many organizations, multichannel access to information, including web, mobile and social channels, presents new digital threats that are often overlooked. Join senior security analyst Nick Hayes of Forrester Research, co-author of The Forrester Wave™: Digital Risk Monitoring, to discuss digital risk monitoring and management.

    Watch this webinar presented by Slashdot Media and sponsored by RiskIQ to learn how to gain visibility into, detect, and respond to digital threats of all kinds. We will discuss:

    How digital risk threatens your organization
    The Digital Risk Maturity Model
    The requisite processes and resources necessary to formalize and fine-tune digital risk management
    Where to prioritize your investment in digital risk for maximum impact
Attack Surface Management
Webinar topics cover securing your public facing web, mobile and social assets, combatting impersonation and rogue digital assets and discovering the digital assets owned by your cyber adversaries

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How RiskIQ Host Pairs Confirmed the Lazarus Group Attack on Polish Banking
  • Live at: May 2 2017 10:35 am
  • Presented by: Gary Paluch Sr. Sales Engineer RiskIQ and Sam Curcuruto Sr. Product Marketer RiskIQ
  • From:
Your email has been sent.
or close