Botconf 2018

APT Attack against the Middle East: The Big Bang

APT Attack against the Middle East: The Big Bang Botconf 2018 Wednesday | 11:00 – 11:30 Aseel Kayal 🗣 | Lotem Finkelstein 🗣 Over the past few weeks, we discovered the comeback of an APT attack against the Middle East, and specifically against the Palestinian Authority.  The APT group behind this attack launched a campaign over a

APT Attack against the Middle East: The Big Bang Read More »

Cutting the Wrong Wire: how a Clumsy Attacker Revealed a Global Cryptojacking Campaign

Cutting the Wrong Wire: how a Clumsy Attacker Revealed a Global Cryptojacking Campaign Botconf 2018 Wednesday | 12:30 – 12:50 Renato Marinho 🗣 We have seen a massive spike in malicious crypto mining campaigns killing themselves for the chance to have their victim’s CPU. The shorter and shorter time window between vulnerability disclosure and cryptojacking

Cutting the Wrong Wire: how a Clumsy Attacker Revealed a Global Cryptojacking Campaign Read More »

Botception: Botnet distributes script with bot capabilities

Botception: Botnet distributes script with bot capabilities Botconf 2018 Thursday | 09:50 – 10:20 Jan Sirmer 🗣 | Adolf Středa 🗣 Monitoring botnets is a crucial component of cybersecurity, but it’s not everyday we see a botnet spreading scripts with bot capabilities. At the end of April 2018, while monitoring one of the branches of the Necurs

Botception: Botnet distributes script with bot capabilities Read More »

Hunting and Detecting APTs using Sysmon and PowerShell Logging

Hunting and Detecting APTs using Sysmon and PowerShell Logging Botconf 2018 Thursday | 11:10 – 11:50 Tom Ueltschi 🗣 Many security professionals and Blue Team members appreciate a good and detailed written APT report by any renowned security company. This is especially true, if they document and explain some new and stealthy technique that was

Hunting and Detecting APTs using Sysmon and PowerShell Logging Read More »

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features Botconf 2018 Friday | 11:10 – 11:50 Piotr Białczak 🗣  When we analyze malware C&C network traffic we often see that it contains HTTP protocol. Sometimes the messages are obfuscated and sometimes sent as plain text. They can be intentionally crafted to look

Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features Read More »

Scroll to Top