What You Need to Know Before
You Start

Starts 9 June 2025 22:34

Ends 9 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

The Spider Economy - Emotet, Dridex, and TrickBot Oh My

Explore the interconnected world of malware families Emotet, Dridex, and TrickBot, understanding their evolution, tactics, and impact on cybersecurity landscapes.
via YouTube

2565 Courses


22 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore the interconnected world of malware families Emotet, Dridex, and TrickBot, understanding their evolution, tactics, and impact on cybersecurity landscapes.

Syllabus

  • Introduction to Malware Ecosystems
  • Overview of malware families
    Importance of studying Emotet, Dridex, and TrickBot
  • History and Evolution of Emotet
  • Origins of Emotet
    Evolution and adaptation over time
    Key incidents and campaigns
  • Understanding Dridex
  • Background and origin
    Evolution in techniques and capabilities
    Notable Dridex campaigns
  • TrickBot Deep Dive
  • Emergence and development
    Modules and functionalities
    Key TrickBot operations and campaigns
  • Tactics, Techniques, and Procedures (TTPs)
  • Common TTPs employed by Emotet, Dridex, and TrickBot
    Analysis of similarities and differences
    Use of infrastructure and delivery mechanisms
  • Impact on Cybersecurity Landscapes
  • Economic and operational impacts on businesses
    Case studies of affected organizations
    Response strategies and challenges
  • Analysis of Interconnectedness
  • How Emotet, Dridex, and TrickBot collaborate
    The role of botnets and payload distribution
    Implications for cybersecurity defenses
  • Detection and Mitigation Strategies
  • Identifying warning signs and malware indicators
    Current defense mechanisms and their effectiveness
    Best practices for mitigation and response
  • Future Trends and Predictions
  • Expected developments in Emotet, Dridex, and TrickBot
    Evolution of malware tactics
    Preparing for future threats
  • Course Conclusion
  • Summary of key insights
    Discussion on future learning paths
    Open forum for questions and discussion
  • Additional Resources
  • Recommended readings and research papers
    Tools for malware analysis and monitoring

Subjects

Conference Talks