Botconf 2013

Legal limits of proactive actions: Coreflood botnet example

Legal limits of proactive actions: Coreflood botnet example Botconf 2013 Thursday | 13:00 – 13:20 Oğuz Kaan Pehlivan 🗣 Passive defense mechanisms are necessary component of well-designed cyber defense programs but they are no longer sufficient to address increasingly sophisticated threats. Thus, addressing the threats more comprehensively may require additional mechanisms. So, active cyber defense

Legal limits of proactive actions: Coreflood botnet example Read More »

Distributed Malware Proxy Networks

Distributed Malware Proxy Networks Botconf 2013 Thursday | 11:30 – 12:10 Brad Porter 🗣 | Nick Summerlin This presentation discusses several existing proxy networks used in malware campaigns and our efforts to track them in an automated fashion. Criminals are increasingly turning to proxy networks to provide an additional layer of protection between their adversaries (law enforcement

Distributed Malware Proxy Networks Read More »

Advanced Techniques in Modern Banking Trojans

Advanced Techniques in Modern Banking Trojans Botconf 2013 Thursday | 10:10 – 10:50 Thomas Siebert 🗣 Banking Trojans are proven to be a successful cybercrime business model. However, the creation of URL blacklists heavily affected the cybercrime operations. This talk shows new command-and-control methods the cybercriminals have implemented to avoid blacklists. Another challenge for banking

Advanced Techniques in Modern Banking Trojans Read More »

Scroll to Top