Common toolkits: Banking trojans and exploitation frameworks

FIRST TC Plennary sessions

Wednesday — October 17th, 2007 11:20

Attackers use toolkits to generate a large percentage of the malicious code companies face. By analyzing and understanding these tools we can develop strategies to quickly identify and mitigate the threats they pose.

Again I'd like to thank you for allowing me to speak at the FIRST TC. It was a great honor to meet so many new contacts from Latin America who I probably would not have had the opportunity to meet without this conference.

Presenters

  • Michael La Pilla (VeriSign — iDefense, US) US

    Michael La Pilla, Manager, iDefense Malicious Code Operations Team

    Mr. La Pilla leads the iDefense Malicious Code Operations Group (Malcode), responsible for the active collection of open-source intelligence, and for the reporting and analysis of new and prevalent malicious code. Mr. La Pilla also develops and maintains projects for the iDefense malicious code lab. Mr. La Pilla's expertise lies in the area of malicious code that targets financial institutions and their customers. Prior to joining iDefense, Mr. La Pilla worked as a contractor in the Web hosting sector while pursuing a BS in Computer Engineering from Virginia Tech.