Contrairement à l’annonce effectuée il y a quelques semaines, nous n’avons pas pu nous rendre à Bordeaux pour participer à la Botconf comme nous l’aurions voulu. Les difficultés liées aux moyens de transports ayant eu raison de notre volonté.
Si vous vous êtes retrouvés dans une situation similaire, nous vous avons concocté une synthèses des conférences qui ont eu lieu ainsi que des ressources associées disponibles sur Internet.
1ère journée
- DeStroid – Fighting String Encryption in Android Malware, Daniel Baier, Martin Lambertz (@danielbaier)
- Golden Chickens: Uncovering A Malware-as-a-Service (MaaS) Provider and Two New Threat Actors Using It, Marco Riccardi, Chaz Hobson, Allison Ebel (@riccardi_marco)
- Unrevealing the Architecture Behind the Counter-Strike 1.6 Botnet: Zero-Days and Trojans, Ivan Korolev, Igor Zdobnov (@fe7ch)
- Keynote – Putting an end to Retadup, Gilles Schwoerer, Michal Salat (@gilmoris1, @michal_salat)
- An Android Botnet Analysis – Shaoye Botnet, Min-Chun Tsai, Jen-Ho Hsiao, Ding-You Hsiao
- Tracking Botnets with Long Term Sandboxing, Piotr Bialczak, Adrian Korczak (@bialczakp)
- Insights and Trends in the Data-Center Security Landscape, Daniel Goldberg, Ophir Harpaz (@OphirHarpaz)
- The Hunt for 3ve, Dimitris Theodorakis, Ryan Castellucci (@dtheodorakis, @ryancdotorg)
- Guildma: Timers Sent from Hell, Adolf Streda, Luigino Camastra, Jan Vojtešek (@stredaadolf)
2eme journée
- Preinstalled Gems on Cheap Mobile Phones, Laura Guevara
- Honor Among Thieves: How Stealer Malware Fuels an Underground Economy of Compromised Accounts, Brian Carter (@briancarterindy)
- Bot with Rootkit: Update and Mine!, Alexander Eremin, Alexey Shulmin (@alexandereremin)
- “DESKTOP-Group” – Tracking a Persistent Threat Group (using Email Headers), Tom Ueltschi (@c_APT_ure)
- The Bagsu Banker Case, Benoît Ancel
- Tracking Samples on a Budget, Alexandre Holzer (@eurozn)
- Botnet Tracking Story : from Spam Mail to Money Laundering, Thomas Dubier, Christophe Rieunier (@tomtombinary)
- Finding Neutrino Botnet: from Web Scans to Botnet Architecture, Kirill Shipulin, Alexey Goncharov (@kirill_wow, @ag4888_)
- BackSwap Malware Campaign Evolution, Carlos Rubio Ricote, David Pastor Sanz (@dpastoresc)
- Winnti Arsenal: Brand-new Supplies, Mathieu Tartare, Marc-Étienne Léveillé (@mathieutartare, @marc_etienne_)
- DFIR & Crisis Management – Post-mortems & Lessons Learned in the Pain from the Field, Vincent Nguyen, Jean Marsault, Antoine Vallée (@nguvin, @iansus, @antoine_vall)
3eme journée
- End-to-end Botnet Monitoring with Automated Config Extraction and Emulated Network Participation, Kevin O’Reilly and Keith Jarvis
- Roaming Mantis: A melting pot of Android bots, Suguru Ishimaru, Manabu Niseki, Hiroaki Ogawa
- The Cereals Botnet, Robert Neumann, Gergely Eberhardt
- YARA-Signator: Automated Generation of Code-based YARA Rules, Felix Bilstein, Daniel Plohmann (@fxb_b, @push_pnx)
- Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation, Matthijs Bomhoff, Saskia Hoogma
- Emotet : WordPress Compromises at Scale, Sébastien Mériot (@smeriot)
- Zen: A Complex Campaign of Harmful Android Apps, Lukasz Siewierski (@maldr0id)
- Malspam is Different Spam, Martijn Grooten (@martijn_grooten)
- Demystifying Banking Trojans from Latin America, Juraj Hornák, Jakub Soucek, Martin Jirkal
- Chasing the Joker, Ahmet Bilal Can (@0xabc0)