Opening speech
Opening speech Botconf 2025 Wednesday2025-05-21 | 11:00 – 11:10 Éric Freyssinet 🗣 Edit
Opening speech Botconf 2025 Wednesday2025-05-21 | 11:00 – 11:10 Éric Freyssinet 🗣 Edit
WS2 – Android Malware Exposed: Dissecting Modern Mobile Threats Botconf 2025 Tuesday2025-05-20 | 13:00 – 18:00 Federico Valentini 🗣 | Alessandro Strino 🗣 | Michele Roviello 🗣 Understanding Android malware can initially feel daunting and disorienting, but with a solid foundation of knowledge and a touch of automation, the process becomes much easier. This workshop teaches participants the essential
WS2 – Android Malware Exposed: Dissecting Modern Mobile Threats Read More »
WS3 – Using Suricata to Track Malware Botconf 2025 Tuesday2025-05-20 | 13:00 – 18:00 Érlc Leblond 🗣 | Peter Manev 🗣 The objective of this workshop is to demonstrate how Suricata can be used to leverage network information when tracking malware. With the logging of protocols transactions (NSM), Suricata provides an exhaustive view of network activity that
WS3 – Using Suricata to Track Malware Read More »
WS4 – Ghidra Analysis & Automation Botconf 2025 Tuesday2025-05-20 | 13:30 – 17:30 Max ‘Libra’ Kersten 🗣 Reverse engineering is done for a variety of reasons, most commonly to analyze malware, when searching for (and when looking to understand) vulnerabilities, or simply because of one’s curiosity. The NSA understood this early on and developed a
WS4 – Ghidra Analysis & Automation Read More »
Badge distribution for Workshop attendees & Lunch Botconf 2025 Tuesday2025-05-20 | 12:00 – 13:30 🗣 Edit
Badge distribution for Workshop attendees & Lunch Read More »
IcedID’s Icy Depths: A Year in Infrastructure and Trends Botconf 2024 Friday2024-04-26 | 09:30 – 10:10 Rachelle Goddin 🗣 | Josh Hopkins 🗣 This talk is a continuation on the subject of IcedID, which we presented at Botconf 2023. In our previous talk we covered methodologies for hunting IcedID infrastructure, subsequently explaining how we use these findings
IcedID’s Icy Depths: A Year in Infrastructure and Trends Read More »
Rhadamanthys: The new stealer making WAVs in the eCrime landscape Botconf 2024 Friday2024-04-26 | 10:10 – 10:30 Bea Venzon 🗣 In September 2022, Rhadamanthys first appeared in the eCrime landscape, with detailed forum posts that continue to capture the attention of both threat actors and security researchers. The malware itself is technically complex, utilizing a
Rhadamanthys: The new stealer making WAVs in the eCrime landscape Read More »
Monitoring 1st stage samples used by APTs and crime actors using images Botconf 2024 Friday2024-04-26 | 11:00 – 11:35 Jose Luis Sanchez Martinez 🗣 Images are a common feature of documents, but they can also be a valuable source of intelligence for security analysts. By tracking the images that threat actors use in their documents
Monitoring 1st stage samples used by APTs and crime actors using images Read More »