APT Investigation Backstage
APT Investigation Backstage Botconf 2014 Thursday | 13:40 – 14:20 Ivan Fontarensky 🗣 | Ronan Mouchoux 🗣 | Fabien Périgaud | Cédric Pernet | David Bizeul Edit
APT Investigation Backstage Read More »
APT Investigation Backstage Botconf 2014 Thursday | 13:40 – 14:20 Ivan Fontarensky 🗣 | Ronan Mouchoux 🗣 | Fabien Périgaud | Cédric Pernet | David Bizeul Edit
APT Investigation Backstage Read More »
Middle Income Malware Actors in Poland: VBKlip and Beyond Botconf 2014 Thursday | 14:20 – 14:50 Łukasz Siewierski 🗣 In the past year we have closely observed a new malware family attacking Polish online banking users. It utilized a simple observation: users tend not to check whether the text they copied is the one they
Middle Income Malware Actors in Poland: VBKlip and Beyond Read More »
Bypassing Sandboxes for Fun Botconf 2014 Thursday | 14:50 – 15:20 Paul Jung 🗣 Nowadays malware sandboxes are commonly used by malware researchers. Sandboxes have also find they place commercially as a new security device. Not surprisingly, As was firewall in the 90’, IPS in early 2K and Web applications firewall recently, they are presented
Bypassing Sandboxes for Fun Read More »
Learning Attribution Techniques by Researching a Bitcoin Stealing Cyber Criminal Botconf 2014 Thursday | 15:50 – 16:30 Mark Arena 🗣 Edit
Learning Attribution Techniques by Researching a Bitcoin Stealing Cyber Criminal Read More »
The Russian DDoS One: Booters to Botnets Botconf 2014 Thursday | 16:30 – 17:10 Dennis Schwarz 🗣 The Russian DDoS One or RD1 is an informal grouping of threat actors that focus on providing DDoS booter services on Russian language underground forums. Besides the advertising, contact information, and the occasional drama, most of the business
The Russian DDoS One: Booters to Botnets Read More »
Chinese Chicken: Multiplatform DDoS Botnets Botconf 2014 Thursday | 17:10 – 17:50 Peter Kálnai 🗣 | Jaromír Hořejší 🗣 One of capabilities of a malicious botnet is to perform a distributed denial of service (DDoS) attack. Attacks can be performed by various methods like volumetric flooding, slow HTTP attacks or TCP protocol misuse. A DNS amplification is
Chinese Chicken: Multiplatform DDoS Botnets Read More »
Ponmocup Hunter 2.0 — The Sequel Botconf 2014 Thursday | 17:50 – 18:20 Tom Ueltschi 🗣 Edit PDF Video
Ponmocup Hunter 2.0 — The Sequel Read More »
A New Look at Fast Flux Proxy Networks Botconf 2014 Friday | 09:30 – 10:20 Hendrik Adrian 🗣 | Dhia Mahjoub 🗣 Botnets that run on proxy service networks are not a new topic. We (and other researchers) have discussed this topic at various talks in years past, and it was also one of the main points
A New Look at Fast Flux Proxy Networks Read More »
Botnets of *NIX Web Servers Botconf 2014 Friday | 10:20 – 11:10 Evgeny Sidorov 🗣 | Andrey Kovalev 🗣 | Konstantin Otrashkevich | Asya Posadskaya In the last several years malware writers have clearly understood that getting access to web servers can bring more benefits than infecting users’ PCs. Nowadays there are millions of completely unprotected web-sites and web servers with
Botnets of *NIX Web Servers Read More »
A Timeline of Mobile Botnets Botconf 2014 Thursday | 09:50 – 10:40 Ruchna Nigam 🗣 Edit PDF
A Timeline of Mobile Botnets Read More »