Chapter

Identifying and Stopping an Attacker
listen on Spotify
18:29 - 26:07 (07:37)

A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network. They also noted that expired credit card numbers were a sign that the attacker hadn't been present for very long.

Clips
Invalid credit card numbers were exposed by malware during an investigation into transactions from several years ago.
18:29 - 21:30 (03:01)
listen on Spotify
Malware
Summary

Invalid credit card numbers were exposed by malware during an investigation into transactions from several years ago. Deduplication and verification were necessary to determine actual card numbers.

Chapter
Identifying and Stopping an Attacker
Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
Mimecast is a specialized security solution for email and workplace collaboration that detects suspicious emails and offers an extra layer of protection to your inbox.
21:30 - 22:35 (01:05)
listen on Spotify
Email Security
Summary

Mimecast is a specialized security solution for email and workplace collaboration that detects suspicious emails and offers an extra layer of protection to your inbox. It diversifies your security stack so that your business is not reliant on one generalized solution.

Chapter
Identifying and Stopping an Attacker
Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
Learning to identify pivot points and artifacts can help catch hackers early before they cause major damage, and taking those points offline can stop them in their tracks.
22:35 - 26:07 (03:31)
listen on Spotify
Cybersecurity
Summary

Learning to identify pivot points and artifacts can help catch hackers early before they cause major damage, and taking those points offline can stop them in their tracks.

Chapter
Identifying and Stopping an Attacker
Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries