Botconf presentation or article

Russian Full Spectrum Warfare – DDOSIA Infrastructure Overview & last TTPs

Russian Full Spectrum Warfare – DDOSIA Infrastructure Overview & last TTPs Botconf 2025 Wednesday2025-05-21 | 12:10 – 12:45 Julien Dugay 🗣 | Félix Guyard 🗣 In this presentation we will cover how we could retrieve latest C2s published by the admins of DDOSIA project as soon as a C2 is taken down. We will touch on the […]

Russian Full Spectrum Warfare – DDOSIA Infrastructure Overview & last TTPs Read More »

10 Years of Large-Scale Malware Comparison: Going Deeper With Machoke

10 Years of Large-Scale Malware Comparison: Going Deeper With Machoke Botconf 2025 Wednesday2025-05-21 | 15:10 – 15:30 Tristan Pourcelot 🗣 | Stéfan Le Berre 🗣 As threat hunters, we are often faced with the problems of analyzing many malicious binaries, related or not. Some of the problems encountered are ranging from classifying a sam- ple to a

10 Years of Large-Scale Malware Comparison: Going Deeper With Machoke Read More »

Vietnamese Hacking Group : A Rising of Information Stealing Campaigns Going Global

Vietnamese Hacking Group : A Rising of Information Stealing Campaigns Going Global Botconf 2025 Wednesday2025-05-21 | 14:30 – 15:10 Chetan Raghuprasad 🗣 | Joey Chen In recent years, Vietnamese cybercrime groups have significantly advanced their capabilities, acquiring sophisticated tools and tactics that have enhanced their operational success. The pandemic era marked a turning point, as these groups

Vietnamese Hacking Group : A Rising of Information Stealing Campaigns Going Global Read More »

mirai-toushi: Cross-Architecture Mirai Configuration Extractor Utilizing Standalone Ghidra Script

mirai-toushi: Cross-Architecture Mirai Configuration Extractor Utilizing Standalone Ghidra Script Botconf 2025 Wednesday2025-05-21 | 16:00 – 16:40 Shun Morishita 🗣 | Satoshi Kobayashi | Eisei Hombu In recent years, IoT malware frequently launches DDoS attacks, causing massive damage to ISPs. Since Mirai and its variants account for the vast majority of IoT malware, security researchers develop configuration extracting tools to

mirai-toushi: Cross-Architecture Mirai Configuration Extractor Utilizing Standalone Ghidra Script Read More »

VenomLNK’s Triple Threat: The Backdoor Saga

VenomLNK’s Triple Threat: The Backdoor Saga Botconf 2025 Wednesday2025-05-21 | 11:40 – 12:10 Muhammed Irfan V A 🗣 | Avinash Kumar 🗣 | Nirmal Singh The escalation of cyber threats in recent years has introduced malware with advanced capabilities. Among these, backdoor malware has evolved significantly and new families of backdoor malware have surfaced, showcasing capabilities that threaten organizations

VenomLNK’s Triple Threat: The Backdoor Saga Read More »

Threat Intelligence On Steroids: Exploits, Ransomware And Other Threats At Scale

Threat Intelligence On Steroids: Exploits, Ransomware And Other Threats At Scale Botconf 2025 Wednesday2025-05-21 | 16:40 – 17:20 Sarthak Misraa 🗣 The purpose of the talk is to highlight and overcome the limitation in hunting and tracking malware using traditional means and actors who are abusing this limitation stay hidden for extended periods of time.

Threat Intelligence On Steroids: Exploits, Ransomware And Other Threats At Scale Read More »

Scroll to Top