Poison Ivy: Sniffing out the RAT

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The Poison Ivy remote access tool (RAT) has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

Posion Ivy is so widely used that security professionals are having a harder time tracing attacks that use the RAT to any particular attacker.

Join this webinar to learn exactly how Poison Ivy works, why it remains one of the most widely used RATs and discover free tools that can be used to combat it.


Laura Aylward

Senior Consultant, Context Information Security

    William Beer

    Managing Director, Alvarez & Marsal

    Paul Davis

    VP of Delivery, ThreatGRID

      Ned Moran

      Ned Moran Senior Malware Researcher, FireEye

        Stephen Pritchard

        Moderator, Infosecurity Magazine

          Carl Shallow

          Head of Compliance & QSA, SecureData

            Brought to You by

            Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.