Methods for Understanding Targeted Attacks with Office Documents

Bruce Dang

Playlists: '25c3' videos starting here / audio / related events

As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves. This presentation aims to fill the gap by offering:

Related

Download

Embed

Share:

Tags