Please find below our provisional schedule for Botconf 2024.
Overall schedule
The conference is organised with the following constraints:
- Tuesday 23/04/2024
- 12:00 Registration for workshops & Workshop lunch
- 13:00 Beginning of the workshops
- 18:00 End of the last workshops
- Wednesday 24/04/2024
- 10:00 Opening of the registration desk (only for ticket holders, no payment on site)
- 11:00 Opening of the conference
- ...
- Until Friday 26/04/2024
- 17:00 Closing of the conference
Talks
The following talks have been confirmed:
- It's getting cloudy – peering into the recent APT29 activities - CERT Polska
- 3CX: a "mise en abyme" supply chain attack? - Godefroy Galas and Victorien Fragne
- Eastern Asian Android Assault – FluHorse. - Alexandr Shamshur and Raman Ladutska
- I'm a Bad Noodle!: An Analysis of Noodle RAT Shared among China-nexus Groups - Hiroaki Hara
- Parsing the Unparsable: Turning Analyzers into Victims - Yusuf Kocadas and Furkan Er
- Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov
- Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt
- Everyone Gets a Webshell! Or, Backdooring Web Hosting Companies in Scale - Daniel Frank
- LightSpy2: feature-rich mobile surveillance tool set - Victor Chebyshev
- The Supershell and its widespread Botnet - Chetan Raghuprasad
- IcedID's Icy Depths: A Year in Infrastructure and Trends - Rachelle Goddin and Josh Hopkins
- Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez
- Caviar Scammers: Uncovering the SturgeonPhisher APT Group - Damien Schaeffer
- IoT Malware and Rookit Detections Using Electromagnetic Insights: Unveiling the Unseen - Duy-Phuc Pham, Damien Marion and Annelie Heuser
- Unplugging PlugX: Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay
- A Taxonomic Overview of Prevalent Malware Communication Strategies - Steffen Enders, Daniel Plohmann and Manuel Blatt
- BYOVD Unveiled: Hunting and Exploring Vulnerabilities in Device Drivers - Nirmal Singh and Rajdeepsinh Dodia
- Into the Vapor to Tracking Down Unknown Panda's Claw Marks - Suguru Ishimaru, Yusuke Niwa and Motohiko Sato
- Evasive Panda touring in Asia: AitM opening act followed by a duet of MgBot and Nightdoor - Facundo Munoz and Anh Ho
- GenRex Demonstration: Level Up Your Regex Game - Dominika Regéciová
- Telegram-as-a-C2 or a Fourfold Tale of Bad OPSEC - Pol Thill
- Pikabot's Sophisticated Evasion: We Catch Em All - Pim Trouerbach and Kelsey Merriman
- Gozi ISFB - Memoirs of a banking trojan - Fred Harrison
- New Modular Malware RatelS: Shades of PlugX - Yoshihiro Ishikawa and Takuma Matsumoto
- Writing Configuration Extractors: Navigating the Challenges in Extracting Malware Artifacts. - Souhail Hammou and Miroslav Stampar
- Teams is for C2: Building and Reversing a Teams RAT - Randy Pargman
- Rhadamanthys: The new stealer making WAVs in the eCrime landscape - Bea Venzon
- Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev and Arie Olshtein
- Warp's Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium - Sathwik Ram Prakki and Rayapati Lakshmi Prasanna Sai
- DotNet Malware Analysis - Max Kersten
- Opera1er: from tracking the threat actor to detaining a criminal behind - Anton Ushakov and Hugo Rifflet
Workshops
The following three workshops have been confirmed (special registration will be required, to open soon on the ticketing website)
- Writing Configuration Extractors: Navigating the Challenges in Extracting Malware Artifacts. - Souhail Hammou and Miroslav Stampar
- Teams is for C2: Building and Reversing a Teams RAT - Randy Pargman and Kyle Cucci
- DotNet Malware Analysis - Max Kersten
Quick links
Follow us on our social networks:
- Fediverse: https://infosec.exchange/@Botconf
- Linkedin: https://fr.linkedin.com/company/notconf