Resources • Webinars
The Detection Series: Crypters and loaders
The threat landscape is more commoditized than ever. In this installment of the Detection Series, we examine the role crypters and loaders play in cybercrime, highlighting common variants and describing how security teams can defend their organizations against them.
On-Demand
55 mins.
Virtual
The threat landscape is more commoditized than ever. In this installment of the Detection Series, we examine the role crypters and loaders play in cybercrime, highlighting common variants and describing how security teams can defend their organizations against them.
Every part of the intrusion lifecycle is salable in some way, allowing adversaries to specialize and focus on the stage of an attack they know best. Two major components of this commoditization are crypters—tools that work to make malware more difficult to detect—and loaders—malware built specifically to deliver separate follow-on payloads.
Crypters and loaders may seem niche, but they play a crucial role in enabling a wide range of costly threats ranging from remote access trojans to ransomware and almost everything in between. Since they play a supporting role in all variety of malware operations and, in the case of loaders in particular, precede the most damaging aspects of an intrusion, developing a sound detection strategy for crypters and loaders can go a long way toward helping organizations detect threats early and prevent the worst outcomes of a potential incident.
In this webinar, we explore:
- The role loaders and crypters play in the malware ecosystem
- Common crypters and loaders that any organization should be prepared for
- Strategies for detecting crypters and loaders before they achieve their ultimate objective
Attendees will leave this webinar with actionable strategies they can implement immediately to improve their defense in depth against the wide range of threats that rely on crypters and loaders to be successful.