Botconf 2022

Smoke and Fire – Smokeloader Historical Changes and Trends

Smoke and Fire – Smokeloader Historical Changes and Trends Botconf 2022 Thursday | 16:45 – 17:25 Marcos Alvares 🗣 Smokeloader (aka Sharik or SmokeBot) turned 10 in 2021! Few malware families make to this mark without collapsing or getting caught by law enforcement. For over a decade, Smokeloader has been deployed as part of distribution

Smoke and Fire – Smokeloader Historical Changes and Trends Read More »

Privateloader – The malware behind a havoc-wreaking Pay-Per-Install service

Privateloader – The malware behind a havoc-wreaking Pay-Per-Install service Botconf 2022 Friday | 14:00 – 14:40 Souhail Hammou 🗣 Pay-per-install (PPI) services have been an integral part of the e-crime ecosystem for a considerable amount of time. PPI services monetize wide dissemination of malware by providing the malware operators with mass geo-targeted installs (aka loads)

Privateloader – The malware behind a havoc-wreaking Pay-Per-Install service Read More »

Suricata

Suricata Botconf 2022 Friday | 12:00 – 12:35 Erlc Leblond 🗣 Suricata is a well known open source network threat detection engine. As such it combines network security monitoring capabilities with advanced intrusion detection mechanisms. Dataset is one of the features that is at the border of these two worlds. This presentation will introduce the

Suricata Read More »

ProxyChaos: a year-in-review of Microsoft Exchange exploitation

ProxyChaos: a year-in-review of Microsoft Exchange exploitation Botconf 2022 Friday | 11:20 – 12:00 Mathieu Tartare 🗣 Hundreds of thousands of Microsoft Exchange servers are exposed to the internet, making this Microsoft’s on-premises email server solution the target of choice for attackers. Since the beginning of 2021, Exchange has been subject to several critical vulnerabilities,

ProxyChaos: a year-in-review of Microsoft Exchange exploitation Read More »

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services Botconf 2022 Friday | 10:55 – 11:15 Yael Daihes 🗣 | Hen Tzaban 🗣 Data breaches of enterprises have been one of the most destructive and prominent security threats that enterprises have been facing in recent years. Some well-known APT groups as well

Detecting and Disrupting Compromised Devices based on Their Communication Patterns to Legitimate Web Services Read More »

Scroll to Top