Poison Ivy: Sniffing out the RAT

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The Poison Ivy remote access tool (RAT) has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

Posion Ivy is so widely used that security professionals are having a harder time tracing attacks that use the RAT to any particular attacker.

Join this webinar to learn exactly how Poison Ivy works, why it remains one of the most widely used RATs and discover free tools that can be used to combat it.

Speakers

Photo of Laura Aylward

Laura Aylward

Senior Consultant, Context Information Security

Photo of William Beer

William Beer

Managing Director, Alvarez & Marsal

Photo of Paul Davis

Paul Davis

VP of Delivery, ThreatGRID

Ned Moran

Senior Malware Researcher, FireEye

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Photo of Carl Shallow

Carl Shallow

Head of Compliance & QSA, SecureData

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.