Webinar

A Modern Kill Chain Case Study: The CryptoChameleon Phishing Kit


Thursday, May 23, 2024

2:00 - 3:00 PM EST

60 minutes, including Q&A


The cyber kill chain has evolved. Cloud breaches now happen in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering and phishing attacks.

Discovered by Lookout, a recent example of this is the CryptoChameleon Phishing Kit that was used to target FCC, Coinbase, Binance, Google, and Microsoft. The phishing kit enables attackers to build carbon copies of single sign-on (SSO) pages, then use a vicious combination of social engineering tactics to trick the target into sharing more than just their username and password.

Join one of the leading Threat Intelligence researchers from Lookout, as he dissects CryptoChameleon. You’ll learn:

  • How the cyber kill chain has evolved
  • The novel tactics being used to avoid detection by traditional web analysis tools
  • How social engineering and AI enable the operators to build credibility and trust
  • Actions your organizations can take to mitigate the risk of your employees falling victim to attacks

Sponsored by:

Lookout

Speakers

David Richardson

Vice President of Endpoint & Threat Intelligence

Lookout

As Vice President of Endpoint & Threat Intelligence, David Richardson and his teams are responsible for discovering new cyber threats targeting mobile and developing products to protect enterprises from emerging threats. David has been with Lookout for 15 years in a variety of roles throughout engineering, product management and product strategy. David has been hacking on mobile devices since the early days of Palm and Windows Mobile. He is a frequent speaker at security conferences discussing new threat vectors he has discovered to attack mobile devices. David has over 50 patents issued, most pertaining to finding novel ways to secure mobile devices.


Terry Sweeney

Moderator

Black Hat

Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sustaining Partners