In this session Spike Reply presents methods, tools, and techniques used by attackers when performing so-called "dynamite phishing" attacks, such as Emotet. Being subject to great media attention, this piece of malware penetrated a huge amount of organisations' security measures and caused considerable damage.
The talk quickly summarizes the threats of phishing attacks and outlines how the attack pattern changed over the years. Moreover, an outlook is given which kinds of attacks we might expect to see in the future and what we can do about it.