Editorial team

Identifying malware campaigns on a budget

Identifying malware campaigns on a budget Botconf 2022 Thursday | 09:05 – 09:25 Max ‘Libra’ Kersten 🗣 | Rens van der Linden 🗣 Malware campaigns plague enterprises, entrepreneurs, and individuals. Platforms and tools have been deployed to gain insight into the ongoing situation. Unfortunately, many of these platforms are rather pricey, which is a problem for me,

Identifying malware campaigns on a budget Read More »

A fresh look into the underground card shop ecosystem

A fresh look into the underground card shop ecosystem Botconf 2022 Thursday | 11:00 – 11:30 Beatriz Pimenta Klein 🗣 | Lidia López Sanz 🗣 Law enforcement has seized multiple card shops during recent years. However, every time there is a gap in the card shop business due to law enforcement countermeasures, exit scam from the market

A fresh look into the underground card shop ecosystem Read More »

Syslogk Linux Kernel Rootkit – Executing Bots via “Magic Packets”

Botconf 2023 Wednesday  | 17:05 – 17:35 Long presentation Syslogk Linux Kernel Rootkit – Executing Bots via “Magic Packets” David Álvarez Pérez 🗣 In November 2022, we discovered a new version of the Syslogk Linux kernel rootkit affecting x86 and x86_64 processor architectures (udis86 disassembler dependency). We were not surprised, as the first version we

Syslogk Linux Kernel Rootkit – Executing Bots via “Magic Packets” Read More »

Read The Manual Locker: A Private RaaS Provider

Botconf 2023 Wednesday  | 17:40 – 18:10 Long presentation Read The Manual Locker: A Private RaaS Provider Max ‘Libra’ Kersten 🗣 Another day, another ransomware-as-a-service provider, or so it seems. The “Read The Manual” (RTM) Locker gang targets corporate environments, forcing their affiliates to follow a strict ruleset. Is this yet another ransomware gang, or

Read The Manual Locker: A Private RaaS Provider Read More »

The Case For Real Time Detection of Data Exchange Over the DNS Protocol

Botconf 2023 Thursday  | 15:25 – 15:45 Short presentation The Case For Real Time Detection of Data Exchange Over the DNS Protocol Yarin Ozery 🗣 Data exfiltration and detection has been the subject of lots of research in recent years. DNS exfiltration is the process of abusing the DNS protocol, originally designed for hostname resolving,

The Case For Real Time Detection of Data Exchange Over the DNS Protocol Read More »

Scroll to Top