Botconf 2016

How Does Dridex Hide Friends?

How Does Dridex Hide Friends? Botconf 2016 Thursday | 14:40 – 15:00 Paul Rascagnères 🗣 | Sébastien Larinier 🗣 | Alexandra Toussaint 🗣 During an incident, CERT Sekoia investigated fraudulent money transfers. These transfers were made from a French firm account to other bank accounts based in different places in Europe. The fraud has been valued at 800 000 […]

How Does Dridex Hide Friends? Read More »

Vawtrak Banking Trojan : A Threat to the Banking Ecosystem

Vawtrak Banking Trojan : A Threat to the Banking Ecosystem Botconf 2016 Wednesday | 16:00 – 16:50 Victor Acin 🗣 | Raashid Bhat 🗣 Vawtrak has been among the top banking Trojans since quite a long time now. Banking Trojans have not been discussed much in security conferences contrary to APT’s and other type of malwares. This

Vawtrak Banking Trojan : A Threat to the Banking Ecosystem Read More »

Snoring Is Optional: The Metrics and Economics of Cyber Insurance for Malware Related Claims

Snoring Is Optional: The Metrics and Economics of Cyber Insurance for Malware Related Claims Botconf 2016 Wednesday | 16:55 – 17:35 Wayne Crowder 🗣 Insurance addresses the economics of security on the internet. Cyber insurance is sold to companies as a way to offset the risk and costs of a security incident. Governments, large enterprises

Snoring Is Optional: The Metrics and Economics of Cyber Insurance for Malware Related Claims Read More »

Improve DDoS Botnet Tracking With Honeypots

Improve DDoS Botnet Tracking With Honeypots Botconf 2016 Thursday | 11:50 – 12:20 Ya Liu 🗣 | Wenji Qu DDoS botnet tracking can be used to watch botnet assisted attacks in real time together with the details including the botnet families, C&C servers, attack types, and attack parameters. Such information helps us to learn current DDoS attacks

Improve DDoS Botnet Tracking With Honeypots Read More »

Function Identification and Recovery Signature Tool

Function Identification and Recovery Signature Tool Botconf 2016 Thursday | 12:20 – 12:50 Angel Villegas 🗣 Reverse Engineering benign or malicious samples can take a considerable amount of time and new samples are created daily. Leveraging disassemblers, like IDA Pro, a reverse engineer can analyze the same routines across several samples over the lifetime of

Function Identification and Recovery Signature Tool Read More »

Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk)

Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) Botconf 2016 Thursday | 14:00 – 14:35 Tom Ueltschi 🗣 Enterprises and organizations of all sizes are struggling to prevent and detect all malware attacks and advanced adversary actions inside their networks in a timely manner. Prevention focused technology hasn’t been good enough to prevent

Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) Read More »

Scroll to Top