Data Exfiltration Examples to Detect Extortion Threats
On Demand Webinar

How to Hunt for Ransomware Variants in Your Malware Lab

Data Exfiltration Examples to Detect Extortion Threats







During this webinar, Rob Simmons, Independent Malware & Threat Researcher at ReversingLab, will analyze a ransomware sample that performs data exfiltration in his malware lab. Rob will show how the malware uploads a set of files from the victim's computer to command and control servers, how to identify anti-analysis behavior, and then how to hunt for related variants of the same malware.

WATCH ON DEMAND
Back to Top