Botconf 2025

Tricky obfuscation techniques for C2 communication? Just detect them all!

Tricky obfuscation techniques for C2 communication? Just detect them all! Botconf 2025 Thursday2025-05-22 | 10:55 – 11:35 Kseniia Naumova 🗣 Today most malware and botnets use network communication for tasks such as downloading malicious files, sending stolen data, receiving commands from the C2, etc. Researchers worldwide analyze millions of network traffic streams daily to search

Tricky obfuscation techniques for C2 communication? Just detect them all! Read More »

Doit: Convoluted Stealer Targeting LATAM-Based Users

Doit: Convoluted Stealer Targeting LATAM-Based Users Botconf 2025 Thursday2025-05-22 | 12:05 – 12:25 Kevin Ratto 🗣 In late 2022, an unidentified AutoIt-based eCrime stealer was observed in the wild; it was named Doit. The malware was initially delivered via email spam campaigns targeting users from Chile, Mexico and Peru. In 2023, Doit shifted to exclusively

Doit: Convoluted Stealer Targeting LATAM-Based Users Read More »

Scroll to Top