Hey! Your Database Got Pwned
OVERVIEW
A data breach is an organization’s worst nightmare.
Your databases can be used as a pivot to infiltrate the organization or may be the target to exfiltrate sensitive data.
In this talk we will explore different exploitation techniques used by attackers to attack databases.
We will dive into practical real life examples captured by our honeypots around the world and present advanced detection approach to identify attacks such as:
- ransom and crypto mining campaigns
- malware deployment
- distributed brute-force attacks
- evasion techniques
- slow & low exfiltration