Editorial team

Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation

Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation Botconf 2019 Friday | 14:00 – 14:30 Matthijs Bomhoff 🗣 | Saskia Hoogma 🗣 Encrypted C&C data can make the life of malware analysts and incident handlers a lot harder, as it can make C&C traffic a lot harder to recognise, when done right. Fortunately, […]

Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation Read More »

Emotet : WordPress Compromises at Scale

Emotet : WordPress Compromises at Scale Botconf 2019 Friday | 14:35 – 15:05 Sébastien Mériot 🗣 The Emotet banking trojan has been studied by many researchers since it was first discovered in 2014. In particular, the infection scheme and the Command & Control architecture are both pretty well documented. However, few researchers investigated the way

Emotet : WordPress Compromises at Scale Read More »

Demystifying Banking Trojans from Latin America

Demystifying Banking Trojans from Latin America Botconf 2019 Friday | 16:30 – 17:00 Juraj Horňák 🗣 | Jakub Souček 🗣 | Martin Jirkal 🗣 At the end of 2018, it has been reported that Latin America suffers approximately 3.7 million cyber-attacks per day. Even the most well-known pieces of malware, such as TrickBot or Emotet, have their eyes set

Demystifying Banking Trojans from Latin America Read More »

Suricata for bot hunting and classification

Suricata for bot hunting and classification Botconf 2019 Tuesday | 14:00 – 17:30 Tatyana Shishkova 🗣 One of the distinguishing features of botnets is communication between the bot and the C&C server. Analyzing network traffic is a part of researching a botnet. Suricata, an open-source network threat detection engine, is a powerful tool not only

Suricata for bot hunting and classification Read More »

DeStroid – Fighting String Encryption in Android Malware

DeStroid – Fighting String Encryption in Android Malware Botconf 2019 Wednesday | 10:45 – 11:15 Daniel Baier 🗣 | Martin Lambertz 🗣 In this paper we present DeStroid, an approach to fully automatically decrypt obfuscated strings from Android apps. We focus in particular on current Android malware using advanced string encryption techniques and show that DeStroid outperforms

DeStroid – Fighting String Encryption in Android Malware Read More »

Unrevealing the Architecture Behind the Counter-Strike 1.6 Botnet: Zero-Days and Trojans

Unrevealing the Architecture Behind the Counter-Strike 1.6 Botnet: Zero-Days and Trojans Botconf 2019 Wednesday | 12:05 – 12:35 Ivan Korolev 🗣 | Igor Zdobnov 🗣 The Belonard Botnet was designed to promote servers in Counter-Strike 1.6. In order to achieve that, the botmaster employed the Belonard Trojan, which was spread via malicious game server; an infected pirated

Unrevealing the Architecture Behind the Counter-Strike 1.6 Botnet: Zero-Days and Trojans Read More »

Scroll to Top