Botconf presentation or article

WS2 – Android Malware Exposed: Dissecting Modern Mobile Threats

WS2 – Android Malware Exposed: Dissecting Modern Mobile Threats Botconf 2025 Tuesday2025-05-20 | 13:00 – 18:00 Federico Valentini 🗣 | Alessandro Strino 🗣 | Michele Roviello 🗣 Understanding Android malware can initially feel daunting and disorienting, but with a solid foundation of knowledge and a touch of automation, the process becomes much easier. This workshop teaches participants the essential

WS2 – Android Malware Exposed: Dissecting Modern Mobile Threats Read More »

WS3 – Using Suricata to Track Malware

WS3 – Using Suricata to Track Malware Botconf 2025 Tuesday2025-05-20 | 13:00 – 18:00 Érlc Leblond 🗣 | Peter Manev 🗣 The objective of this workshop is to demonstrate how Suricata can be used to leverage network information when tracking malware. With the logging of protocols transactions (NSM), Suricata provides an exhaustive view of network activity that

WS3 – Using Suricata to Track Malware Read More »

IcedID’s Icy Depths: A Year in Infrastructure and Trends

IcedID’s Icy Depths: A Year in Infrastructure and Trends Botconf 2024 Friday2024-04-26 | 09:30 – 10:10 Rachelle Goddin 🗣 | Josh Hopkins 🗣 This talk is a continuation on the subject of IcedID, which we presented at Botconf 2023. In our previous talk we covered methodologies for hunting IcedID infrastructure, subsequently explaining how we use these findings

IcedID’s Icy Depths: A Year in Infrastructure and Trends Read More »

Rhadamanthys: The new stealer making WAVs in the eCrime landscape

Rhadamanthys: The new stealer making WAVs in the eCrime landscape Botconf 2024 Friday2024-04-26 | 10:10 – 10:30 Bea Venzon 🗣 In September 2022, Rhadamanthys first appeared in the eCrime landscape, with detailed forum posts that continue to capture the attention of both threat actors and security researchers. The malware itself is technically complex, utilizing a

Rhadamanthys: The new stealer making WAVs in the eCrime landscape Read More »

Monitoring 1st stage samples used by APTs and crime actors using images

Monitoring 1st stage samples used by APTs and crime actors using images Botconf 2024 Friday2024-04-26 | 11:00 – 11:35 Jose Luis Sanchez Martinez 🗣 Images are a common feature of documents, but they can also be a valuable source of intelligence for security analysts. By tracking the images that threat actors use in their documents

Monitoring 1st stage samples used by APTs and crime actors using images Read More »

Scroll to Top