Botconf 2022

Smoke and Fire – Smokeloader Historical Changes and Trends

Smoke and Fire – Smokeloader Historical Changes and Trends Botconf 2022 Thursday | 16:45 – 17:25 Marcos Alvares 🗣 Smokeloader (aka Sharik or SmokeBot) turned 10 in 2021! Few malware families make to this mark without collapsing or getting caught by law enforcement. For over a decade, Smokeloader has been deployed as part of distribution

Smoke and Fire – Smokeloader Historical Changes and Trends Read More »

Jumping the air-gap: 15 years of nation-state efforts

Jumping the air-gap: 15 years of nation-state efforts Botconf 2022 Friday | 09:30 – 10:00 Alexis Dorais-Joncas 🗣 | Facundo Munoz 🗣 Air-gapping is used to protect the most sensitive of networks: voting systems, ICSes running power grids, or SCADA systems operating nuclear centrifuges just to name a few. In the first half of 2020 alone, three

Jumping the air-gap: 15 years of nation-state efforts Read More »

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services Botconf 2022 Friday | 10:55 – 11:15 Yael Daihes 🗣 | Hen Tzaban 🗣 Data breaches of enterprises have been one of the most destructive and prominent security threats that enterprises have been facing in recent years. Some well-known APT groups as well

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services Read More »

ProxyChaos: a year-in-review of Microsoft Exchange exploitation

ProxyChaos: a year-in-review of Microsoft Exchange exploitation Botconf 2022 Friday | 11:20 – 12:00 Mathieu Tartare 🗣 Hundreds of thousands of Microsoft Exchange servers are exposed to the internet, making this Microsoft’s on-premises email server solution the target of choice for attackers. Since the beginning of 2021, Exchange has been subject to several critical vulnerabilities,

ProxyChaos: a year-in-review of Microsoft Exchange exploitation Read More »

Scroll to Top