AI vs Malware: token stealing by kernel exploitation
Marco Zonta
Executive Officer | Cybersecurity Architect | Trainer @Cisco/HP/VMWare | Speaker | EMBA
Malicious Doc delivering a ransomware with advanced techniques: Anatomy of an attack!
Here explorer.exe escalates privileges:
Here the Token Stealing by kernel exploitation:
After that, process impersonation detected and tracked:
Here the complete behavioural tree of the attack, and the detail of the first malicious powershell.
Hive completes triage and attack tracking in real time.
One click on Behavioural policy and the system is protected from now on!!