Botconf presentation or article

The Evolution of Malware Distribution Through Ghost Networks

The Evolution of Malware Distribution Through Ghost Networks Botconf 2025 Thursday2025-05-22 | 16:30 – 17:00 Antonis Terefos 🗣 A new era of malware distribution is here, where “ghost”/bot accounts spread malicious links across multiple platforms. The Ghost Network is a sophisticated operation using fake and compromised accounts to act in a legitimate way while spreading […]

The Evolution of Malware Distribution Through Ghost Networks Read More »

Unpacking WIZARD SPIDER’s Crypters: Attribution Challenges in a Tangled Web of Adversaries

Unpacking WIZARD SPIDER’s Crypters: Attribution Challenges in a Tangled Web of Adversaries Botconf 2025 Thursday2025-05-22 | 14:40 – 15:20 Bea Venzon 🗣 | Suweera De Souza 🗣 In the era of law enforcement crackdowns, cybercriminals continue to find ways to adapt, persist and confuse. This is the case with WIZARD SPIDER—a Russian-based cybercrime group known for operating

Unpacking WIZARD SPIDER’s Crypters: Attribution Challenges in a Tangled Web of Adversaries Read More »

Executing RATs in a Long-Term Observable Customized Online Sandbox

Executing RATs in a Long-Term Observable Customized Online Sandbox Botconf 2025 Wednesday2025-05-21 | 11:10 – 11:40 Shohei Hiruta 🗣 | Yuki Umemura | Masaki Kubo | Nobuyuki Kanaya | Takahiro Kasama Malware sandboxes are essential tools for malware analysis, allowing researchers to execute malware in controlled environments to reveal its behavior, communication destinations, and configuration settings. Due to their convenience, a wide variety

Executing RATs in a Long-Term Observable Customized Online Sandbox Read More »

Unmasking Styx Stealer: How a Hacker’s Slip led to an Intelligence Treasure Trove

Unmasking Styx Stealer: How a Hacker’s Slip led to an Intelligence Treasure Trove Botconf 2025 Wednesday2025-05-21 | 14:00 – 14:30 Alexey Bukhteyev 🗣 Careful monitoring of malicious campaigns can sometimes uncover surprising discoveries. Our latest research revealed that even skilled cybercriminals, despite their meticulous efforts to stay in the shadows, can commit critical security blunders.

Unmasking Styx Stealer: How a Hacker’s Slip led to an Intelligence Treasure Trove Read More »

Behind Enemy Lines: the Modern Infostealer Ecosystem from Victims to Operators

Behind Enemy Lines: the Modern Infostealer Ecosystem from Victims to Operators Botconf 2025 Wednesday2025-05-21 | 17:20 – 18:05 Olivier Bilodeau 🗣 | Estelle Ruellan 🗣 Modern information stealers have evolved far beyond simple credential harvesters into sophisticated tools that capture complete digital profiles of their victims. Our deep-dive dissects the anatomy of stealer malware, exploring infection methods,

Behind Enemy Lines: the Modern Infostealer Ecosystem from Victims to Operators Read More »

Scroll to Top