Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Oct 19, 2017
Automation Attacks at Scale
by Will Glazier & Mayank Dhiman
Automation attacks are currently plaguing organizations in industries ranging from financial and retail, to gaming and entertainment. These attacks exploit stolen credential leaks, black market & custom attack toolkits, and massively scalable infrastructure to launch widely distributed attacks that are extremely difficult to detect, let alone attribute. In this presentation we will inform the audience of the scale of this problem, discuss a detection methodology to counter these attacks, and walk through 3 real-world examples of how attackers created and monetized the distributed infrastructure they require to launch these attacks.
Bio: Will Glazier
Will Glazier serves as Stealth Security’s Threat Intelligence Analyst & Architect. His primary interests include understanding attacker infrastructure responsible for malicious automation attacks, including account takeover. His current focus is on building out a threat intelligence database with indicators relevant to the problem of malicious automation, by tracking the use of leaked credentials, shared attacker infrastructure, and black market attack toolkits. His previous experience includes a stint at Fireeye. He holds a BA in International Relations & Economics from Tufts University.
Bio: Mayank Dhiman
Mayank Dhiman serves as Stealth Security’s Principal Security Researcher. His primary interests include solving problems related to online fraud and internet abuse. His current focus lies in detecting and mitigating malicious automation attacks. Previously, he had worked on fraud and abuse related solutions at Facebook and PayPal. He is the co-author of a number of research papers and book chapters and his work has been presented at USENIX HotSec, NDSS USEC, APWG eCrime and RSA. He holds a MS in Computer Science from UC San Diego.