Webinars

S2:E3 // When Updates Turn Rogue: The Forensic Trail of a Supply Chain Attack

Supply chain attacks are among the most dangerous threats in modern cyber operations — not because they exploit software flaws, but because they exploit trust. In this we’ll examine several recent, high-impact supply chain compromises and then recreate one in the lab using DLL side-loading. Attendees will observe how trusted binaries can be weaponized to execute attacker-controlled payloads and how malicious and benign components can coexist in the same delivery mechanism.

In this episode of Cyber Unpacked we blend real-world case studies with a lab-built demonstration to highlight forensic techniques for tracing execution paths, detecting tampered binaries, and uncovering artifacts left behind on disk and in memory. Participants will gain actionable insights into the anatomy of side-loading supply chain attacks, learn to recognize their signatures on the wire and in forensic images, and test practical detection methods using forensic tools.

Doug Metz
Senior Security Forensics Specialist, Magnet Forensics
Jeff Rutherford
Forensics Consultant, Magnet Forensics
DURATION
45 Min.

Register Now

Share

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top