Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Poison Ivy: Sniffing out the RAT

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The Poison Ivy remote access tool (RAT) has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

Posion Ivy is so widely used that security professionals are having a harder time tracing attacks that use the RAT to any particular attacker.

Join this webinar to learn exactly how Poison Ivy works, why it remains one of the most widely used RATs and discover free tools that can be used to combat it.


Laura Aylward

Senior Consultant, Context Information Security

    William Beer

    Managing Director, Alvarez & Marsal

    Paul Davis

    VP of Delivery, ThreatGRID

      Ned Moran

      Ned Moran Senior Malware Researcher, FireEye

        Stephen Pritchard

        Moderator, Infosecurity Magazine

          Carl Shallow

          Head of Compliance & QSA, SecureData

            Brought to You by