Editorial team

Internals of a Spam Distribution Botnet

Internals of a Spam Distribution Botnet Botconf 2018 Thursday | 09:00 – 09:50 Jose Miguel Esparza 🗣 Cybercriminals use different methods to distribute malware like malicious advertisements, Exploit Kits, loaders or spam campaigns. Unless an attack is really targeted the bad guys will try to infect as many computers as possible and they need some […]

Internals of a Spam Distribution Botnet Read More »

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features Botconf 2018 Friday | 11:10 – 11:50 Piotr Białczak 🗣  When we analyze malware C&C network traffic we often see that it contains HTTP protocol. Sometimes the messages are obfuscated and sometimes sent as plain text. They can be intentionally crafted to look

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features Read More »

Stagecraft of Malicious Office Documents – A Look at Recent Campaigns

Stagecraft of Malicious Office Documents – A Look at Recent Campaigns Botconf 2018 Thursday | 10:20 – 10:50 Nirmal Singh 🗣 | Deepen Desai 🗣 | Tarun Dewan 🗣 Malicious office documents have become a favorite malware delivery tool for malware authors. We have observed an increase in use of malicious documents over past 4 years. 30% of the

Stagecraft of Malicious Office Documents – A Look at Recent Campaigns Read More »

Tracking Actors through their Webinjects

Tracking Actors through their Webinjects Botconf 2018 Friday | 12:20 – 13:00 James Wyke 🗣 Webinjects have been a feature of banking malware ever since they were popularised with great success by early families such as Zeus. In that time writing Webinjects has become a highly specialized skill with off-the-shelf Webinjects systems becoming as popular

Tracking Actors through their Webinjects Read More »

Scroll to Top