Editorial team

The story of Cryptowall: a historical analysis of a large scale cryptographic ransomware threat

The story of Cryptowall: a historical analysis of a large scale cryptographic ransomware threat Botconf 2015 Friday | 09:30 – 10:00 Yonathan Klijnsma 🗣 For almost two years Cryptowall has been making its rounds encrypting the files of victims and extorting them for money in the form of Bitcoins. Following in the footsteps of Cryptolocker

The story of Cryptowall: a historical analysis of a large scale cryptographic ransomware threat Read More »

Inside DarkComet: a wild case-study

Inside DarkComet: a wild case-study Botconf 2015 Friday | 11:00 – 11:50 Jeremy du Bruyn 🗣 This research discusses the application of a framework for the automated analysis of malware samples, specifically botnet binaries, which automates the collection, analysis, and infiltration of botnets. Due to the increased number of samples released daily, such frameworks have

Inside DarkComet: a wild case-study Read More »

Air-gap limitations and bypass techniques: “command and control” using Smart Electromagnetic Interferences

Air-gap limitations and bypass techniques: “command and control” using Smart Electromagnetic Interferences Botconf 2015 Friday | 11:50 – 12:30 Chaouki Kasmi 🗣 | José Lopes Esteves 🗣 | Philippe Valembois 🗣 Air gaps are generally considered to be a very efficient information security protection. However, this technique also showed limitations, involving finding covert channels for bridging the air gap.

Air-gap limitations and bypass techniques: “command and control” using Smart Electromagnetic Interferences Read More »

Scroll to Top