VB2016 'Last-Minute' Papers Announced

Posted by   Martijn Grooten on   Sep 13, 2016

With a little over three weeks to go until VB2016, the conference programme is almost complete. We have a great selection of talks on the main programme, half a dozen Small Talks that we hope will lead to interesting discussions among participants, and a closing keynote from Morgan Marquis-Boire, the hacker, security researcher and journalist, known for his work for Citizen Lab and The Intercept.

We are excited to announce the addition of nine 'last-minute' papers to the programme: presentations covering very hot research topics, which were selected just last week.

Last year's closing keynote speaker, Kaspersky Lab researcher Costin Raiu, is back with a last-minute presentation on unattributed APT groups, which promises to be very exciting. The same holds for a presentation by his colleague Kurt Baumgartner, who will discuss watering hole attacks targeting Italian and Belgian users of encryption.

costinraiuvb2015.png

Not all attacks that affect businesses and individuals are targeted, and one of the most serious threats in the past few years has been ransomware. Though unbreakable when things are done right, fortunately mistakes are often made, allowing researchers to write decryption tools. Malwarebytes researcher hasherezade will talk about her efforts to break recent ransomware families.

If malware doesn't go after your files, then it often goes after your online banking details. Two last-minute presentations will look at banking malware, which remains a serious threat around the world. Jarosław Jedynak from CERT Poland will discuss Nymaim, malware that has targeted more than 270 Polish banks, while Avast's Jaromir Horejsi and Jan Sirmer will discuss how malicious proxy auto-config (PAC) files are used by the Retefe banking trojan.

It's not only Windows users that have to worry about threats these days: malware targeting OS X is increasingly common. ESET researchers Peter Kalnai and Martin Jirkal will discuss how both the KeRanger and the Keydnap malware were distributed as recompiled versions of the legitimate Transmission Bittorrent client. Synack's Patrick Wardle will present a new vector for malware on OS X to stealthily record audio and video, and will also look at the audio/video capture capabilities of the newly discovered Mokes trojan.

patrickwardlevb2015.png

With malware still as big a threat as it was a decade ago, there is understandably a lot of focus on endpoint security. However, the market of endpoint security products is rapidly changing. Adrian Sanabria from 451 Research will discuss these changes and predict how the market may look in five years' time.

Finally, not all attacks take place on the endpoint. The Border Gateway Protocol (BGP) is both an important glue that allows us to route packers over the Internet and a weak point that can (and sometimes is) abused. Mike Benjamin from Level 3 Communications will discuss the current state of BGP and what can be done to improve security.

Want to join us in Denver? Registration for VB2016 is still open and if you're a first time attendee (from a first-time company) you get a 30% discount!VB2016-dates-web.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 video: The Big Bang Theory by APT-C-23

Today, we release the video of the VB2018 presentation by Check Point researcher Aseel Kayal, who connected the various dots relating to campaigns by the APT-C-23 threat group.

VB2019 London - join us for the most international threat intelligence conference!

VB calls on organisations and individuals involved in threat intelligence from around the world to participate in next year's Virus Bulletin conference.

VB2018 paper: Tracking Mirai variants

Today, we publish the VB2018 paper by Qihoo 360 researchers Ya Liu and Hui Wang, on extracting data from variants of the Mirai botnet to classify and track variants.

VB2018 paper: Hide'n'Seek: an adaptive peer-to-peer IoT botnet

2018 has seen an increase in the variety of botnets living on the Internet of Things - such as Hide'N'Seek, which is notable for its use of peer-to-peer for command-and-control communication. Today, we publish the VB2018 paper by Bitdefender…

New paper: Botception: botnet distributes script with bot capabilities

In a new paper, Avast researchers Jan Sirmer and Adolf Streda look at how a spam campaign sent via the Necurs botnet was delivering the Flawed Ammyy RAT. As well as publishing the paper, we have also released the video of the reseachers' VB2018…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.