Star 0

Abstract

The world of mobile devices is exploding. As these mini-computers evolve, adversaries continue to refine their tactics, techniques, and procedures to compromise your shiny new smartphone and tablets. These devices are not just another data storage platform - they are an extension of your physical persona, capable of tracking your location, covertly activating your microphone or camera and intercepting phone calls and SMS. Exploits are being weaponized as we speak to take advantage of yet to be disclosed vulnerabilities in the most popular mobile platforms. In this session we explore the seedy underground trade of mobile Remote Access Tools (RATs). We will detail real life investigations and demonstrate the latest in Mobile RAT technologies. Prepare yourself for the next wave of attack.