Botconf 2017

How to Compute the Clusterization of a Very Large Dataset of Malware with Open Source Tools for Fun & Profit?

How to Compute the Clusterization of a Very Large Dataset of Malware with Open Source Tools for Fun & Profit? Botconf 2017 Wednesday | 10:30 – 11:10 Robert Erra 🗣 | Sébastien Larinier 🗣 | Alexandre Letois | Marwan Burelle Malware are now developed at an industrial scale and human analysts need automatic tools to help them.We propose here to present

How to Compute the Clusterization of a Very Large Dataset of Malware with Open Source Tools for Fun & Profit? Read More »

Malware, Penny Stocks, Pharma Spam — Necurs Delivers

Malware, Penny Stocks, Pharma Spam — Necurs Delivers Botconf 2017 Friday | 14:00 – 14:30 Jaeson Schultz 🗣 | Warren Mercer | Edmund Brumaghin | Nick Biasini Email threats have always been a major part of the threat landscape. As the use of exploit kits and other malware distribution techniques have decreased, malicious spam campaigns play an even greater role in

Malware, Penny Stocks, Pharma Spam — Necurs Delivers Read More »

KNIGHTCRAWLER, « Discovering Watering-holes for Fun, Nothing. »

KNIGHTCRAWLER, « Discovering Watering-holes for Fun, Nothing. » Botconf 2017 Thursday | 09:30 – 09:50 Félix Aimé 🗣 How to find watering holes (aka. Strategic Web Compromise – SWC) from your bedroom? At the intersection between geopolitics and technology, « KNIGHTCRAWLER » is a personal project developed to find some malicious activities on several thousand

KNIGHTCRAWLER, « Discovering Watering-holes for Fun, Nothing. » Read More »

Malware Uncertainty Principle: an Alteration of Malware Behavior by Close Observation

Malware Uncertainty Principle: an Alteration of Malware Behavior by Close Observation Botconf 2017 Thursday | 10:20 – 10:50 Maria Jose Erquiaga 🗣 | Sebastián García | Carlos Garcia Garino During the last couple of years there has been an important surge on the use of HTTPs by malware. The exact reason for this increase is not completely understood yet,

Malware Uncertainty Principle: an Alteration of Malware Behavior by Close Observation Read More »

Scroll to Top