Skip to main content

Webinar: Microsoft RDP, DNS and Other Protocols are Exploited in DDoS Extortion Campaign

For the past several months NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) has been tracking and helping organizations defend themselves from the Lazarus Bear Armada (LBA) DDoS Extortion Campaign. Watch this webinar to: · Learn how the attacker continues to target and retarget different industries and critical infrastructure (e.g. as VPN concentrators) on a worldwide basis. · Get updated information on the latest attack vectors being used in the campaign including everyday protocols such as Microsoft RDP, DNS, NTP and more. · Take a behind-the-scenes glimpse into how ASERT gathers Threat Intelligence. · Understand current best practices in defense

About the Author

Roland Dobbins is a Principal Engineer on NETSCOUT’s ASERT Team. He has more than 30 years of operational experience in the service provider (SP) and large enterprise arenas, designing, deploying, operating, securing, maintaining, troubleshooting and defending many of the highest-visibility networks in the world. He is a recognized industry leader in the fields of operational security (opsec) and network telemetry, and has an extensive background in security product/feature innovation, devising operational security requirements for network infrastructure devices and protocol design. His focus is on extending the availability, scalability and security of the network infrastructure and the applications/services it enables, with an emphasis on flexible and resilient global service delivery capabilities.

Profile Photo of Roland Dobbins