Microsoft RDP, DNS and Other Protocols are Exploited in DDoS Extortion Campaign

Presented by

Tom Bienkowski, Director Product Marketing and Roland Dobbins, Principal Engineer

About this talk

For the past several months NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) has been tracking and helping organizations defend themselves from the Lazarus Bear Armada (LBA) DDoS Extortion Campaign. Join us in this webinar to: · Learn how the attacker continues to target and retarget different industries and critical infrastructure (e.g. as VPN concentrators) on a worldwide basis. · Get updated information on the latest attack vectors being used in the campaign including everyday protocols such as Microsoft RDP, DNS, NTP and more. · Take a behind-the-scenes glimpse into how ASERT gathers Threat Intelligence. · Understand current best practices in defense

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (98)
Subscribers (33916)
NETSCOUT is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.