Information Security Researcher to Showcase Mac Trojan Infection Vectors at HackMiami 2014 Hackers Conference

Christopher Elisan will outline the cross platform evolution of ransomware campaigns that have been observed targeting the Apple MacOS operating system.

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInShare on PinterestEmail a friend
HackMiami 2014 Hacking Conference - Miami Beach, FL

HackMiami 2014 Hacking Conference - Miami Beach, FL

Malicious hackers are making use of client side browser exploitation to deploy Mac compatible ransomware payloads,” stated Christopher Elisan, principle malware scientist at RSA Security Division.

MIAMI BEACH, FL (PRWEB) March 31, 2014

This upcoming May at the HackMiami 2014 Hackers Conference, information security analyst Christopher Elisan will demonstrate how traditional ransomware campaigns have evolved beyond the infection and extortion of Microsoft Windows users. Ransomware campaigns consist of infecting an end user with malware that disables the operating system and displays fake warning messages that demand payment in the forms of anonymized electronic currencies.

The method has been leveraged by digital crime groups for several years with an emphasis on Windows operating system due to the larger user base. However, as more corporate infrastructures and consumer devices are beginning to make use of MacOS a perceived ‘safer’ alternative, criminal groups are responding in kind by developing custom malware that leverages cross platform infection vectors.

“Malicious hackers are making use of client side browser exploitation to deploy Mac compatible ransomware payloads,” stated Christopher Elisan, principle malware scientist at RSA Security Division.

“Regardless of what browser the user prefers, attackers are still able to take the MacOS hostage and intimidate the user into paying a ‘ransom.’” The talk will also showcase ransomware campaign flaws that gave law enforcement agencies the ability to break up several large operations.

Elisan’s latest research is featured in “Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition” published by McGraw Hill and available on Amazon.

A limited number of tickets to the HackMiami 2014 conference are available for purchase at HackMiami.com

About HackMiami 2014 Hackers Conference

The HackMiami 2014 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape. Conference dates May 9th to May 11th 2014 in Miami Beach, Florida.

The conference features a jam packed schedule of tracks that will appeal to both novice hackers and seasoned professionals, as well as anyone who considers themselves to be part of Teh Internet [sp]. There are also bunch of events and contests that are guaranteed to both entertain and educate, such as the notorious Kommand && Kontroll Hacking Tournament and the Internet Computer Party, both taking place May 10, 2014.

Last year, the HackMiami 2013 Hackers Conference was featured in Rolling Stone magazine. Many other major mainstream media outlets have featured coverage of HackMiami events, as they showcase as a different side of the information security community that emphasizes research on underground offensive security methodologies.

About HackMiami

HackMiami is the premier partnership resource in South Florida for information security services such as vulnerability analysis, penetration testing, and training courses.

HackMiami seeks to develop and harness the participation of the information security community through regular events, presentations, labs and competitions. These events allow the hacker community a forum to present their research, develop new techniques and methodologies, while at the same time providing a valuable networking resource for contracting opportunities.


Contact

Follow us on: Contact's Twitter