VB2023 programme


Wednesday 4 October 2023

Time Green room Red room
Small Talks
10:30 - 10:40

Opening address
(takes place in the Green room)

10:40 - 11:20 Keynote address: Solving cyber insecurity Martin Lee (Cisco Talos)
(takes place in the Green room)
  
11:20 - 11:50 TetrisPhantom: targeted attacks using secure USB Noushin Shabab (Kaspersky) RedStinger: new APT discovered amid Russia-Ukraine conflict Roberto Santos (Independent researcher) & Hossein Jazi (Fortinet)  
11:50 - 12:20 Tales from a cloud CSIRT – let's deep dive into a Kubernetes (k8s) infection Santiago Abastante (Solidarity Labs) The evolution of TA551 Berk Albayrak (PRODAFT)  
12:20 - 14:00 Lunch 
14:00 - 14:30 Let's go door with KCP Yoshihiro Ishikawa & Takuma Matsumoto (LAC) Possible supply chain attack targeting South Asian government delivers Shadowpad Daniel Lunghi (Trend Micro) Applied one-to-many code similarity analysis using MCRIT Daniel Plohmann (Fraunhofer FKIE)
14:30 - 15:00 Unravelling the MOVEit vulnerability: a journey from exploitation to Clop ransomware infestation Prashant Tilekar (Forescout Technologies) $100 hardware backdoors – your old routers may be happily spilling corporate secrets Cameron Camp (ESET)
15:00 - 15:30 Abusing Electron-based applications in targeted attacks Jaromir Horejsi (Trend Micro) Darkbit decoded: analysis of an Iranian-sponsored attack Itay Cohen & Ben Herzog (Check Point) PARTNER PRESENTATION: Reversing Nim binaries Holger Unterbrink (Cisco Talos)
15:30 - 16:00 Tea/Coffee 
16:00 - 16:30 Lazarus campaigns and backdoors in 2022-2023 Peter Kálnai (ESET)  Sheep's clothing of deep & dark web operators: there are no secrets you can hide forever Youjin Lee, Kyunghee Kim, Jungyeon Lim & Dasom Kim (S2W) Data mining, darknet and chat monitoring – a deep dive into Telegram monitoring and the latest features of the AIL framework Steve Clement (Luxembourg House of Cybersecurity) & Aurélien Thirion (CIRCL)

16:30 - 17:00 Everything happens for a reason: the choices made by ransomware operators Jono Davis (PwC) Hit the bullseye: detecting browser exploits abusing the X memory in WebAssembly Tao Yan & Edouard Bochin (Palo Alto Networks)
17:00 - 17:30 Side loading is not dead: the Chinese and the Korean way Gabor Szappanos (Sophos) Browser extensions as an emerging threat vector: unveiling the MANGO malware Bahare Sabouri (Google) The rise of China-based financially motivated threat actors? Marc Burnard (Secureworks)
17:30 - 18:30  Posters will be displayed throughout the day in the conference foyer, with a poster presentation session at the end of the day.
19:30 - 21:00 VB2023 drinks reception

Thursday 5 October 2023

Time Green room Red room
Small Talks / Threat Intelligence Practitioners' Summit
09:00 - 09:30 South Korean Android banking menace – FakeCalls Raman Ladutska (Check Point) The history and tactics of visa-centric scams in search, spam, and social apps Chris Boyd (Malwarebytes)

CTA Threat Intelligence Practitioners' Summit:
Welcome address Michael Daniel (Cyber Threat Alliance)

followed by

Keynote: Evolution vs extinction & the 10th man Dave Lewis (Cisco)

09:30 - 10:00 Terror in Peru: the Zanubis banking trojan Fernando Diaz Urbano (VirusTotal)   FirePeony: a ghost wandering around the Royal Road Rintaro Koike & Shogo Hayashi (NTT Security Holdings) CTA Threat Intelligence Practitioners' Summit:
Exploring the efficacy of community-driven TI: a real-world approach Samir Mody & Hariharan S (K7) 
10:00 - 10:30 Looking into TUT's tomb: the universe of threats in LATAM Camilo Gutiérrez Amaya & Fernando Tavella (ESET) Mac-ing sense of the 3CX supply chain attack: analysis of the macOS payloads Patrick Wardle (Objective-See) CTA Threat Intelligence Practitioners' Summit:
Little crumbs can lead to giants Christiaan Beek (Rapid7) 
10:30 - 11:00 Tea/Coffee 
11:00 - 11:30 Don't flatten yourself: restoring malware with Control-Flow Flattening obfuscation Geri Revay (Fortinet) When a botnet cries: detecting botnet infection chains Guillaume Couchard & Erwan Chevalier (Sekoia.io)  CTA Threat Intelligence Practitioners' Summit:
Operation Cookiemonster – the law enforcement response to the notorious Genesis Market Marijn Schuurbiers (Europol)
11:30 - 12:00 DNS "takeover": the full journey and redemption John Jensen & Ines Vestia (Silent Push) Look out! Outlook's gonna get you! Anurag Shandilya (K7 Computing)  CTA Threat Intelligence Practitioners' Summit: 
Panel: All for value and value for all – 'responding RFIs: the merit lies in the difficulty' Douglas Santos (Fortinet), Kathi Whitbey (Palo Alto Networks), Noortje Henrichs (National Cybersecurity Centre, Netherlands), Righard Zwienenberg (ESET)
12:00 - 12:30 "Undocumented"[2:] MSI format. Take it. We are gganbu, aren't we? Daniel (Jinyoung) Choi (Avira, part of Gen) SharpTongue: pwning your foreign policy, one interview request at a time Tom Lancaster (Volexity)  CTA Threat Intelligence Practitioners' Summit: 
Why joining forces can help solve the crime… or not
Sara Eberle (Sophos) & Doug Domin (FBI)
12:30 - 14:00 Lunch 
14:00 - 14:30 R2R stomping – are you ready to run? Jiří Vinopal (Check Point Research)  Stolen cookies, stolen identity: how malware makers are exploiting the insecurity of browser data storage Joshua Long (Intego) CTA Threat Intelligence Practitioners' Summit:
Fireside chat: Dream on: exploring the community effect in cybersecurity 
Kathi Whitbey (Palo Alto Networks), Selena Larson (Proofpoint), Jeannette Jarvis (Cyber Threat Alliance)
14:30 - 15:00 Deobfuscating virtualized malware using Hex-Rays Decompiler Georgy Kucherin (Kaspersky) May the Shadow Force be with Maggie – Shadow Force Group characteristics and relationship to Maggie Minseok (Jacky) Cha, Junseok Kim & Jaejin Lee (AhnLab) CTA Threat Intelligence Practitioners' Summit: 
AI-based digital evidence enhancement technology for profiling attack groups and techniques to respond to cybersecurity threats
Kihong Kim, Changgyun Kim & Hyunjong Lee (SANDS Lab)

15:00 - 15:30 Dancing the night away with named pipes Daniel Stepanic (Elastic) USB flows in the Great River: classic tradecraft is still alive Hiroshi Takeuchi (MACNICA)

CTA Threat Intelligence Practitioners' Summit:
The global state of scams in 2023 Jorij Abraham (GASA)

15:30 - 16:00 Tea/Coffee 
16:00 - 16:30 Ransoming and clipping for illicit cryptocurrency gains Chetan Raghuprasad (Cisco Talos) C2F2: a framework for detecting C2 frameworks at scale Sebastiano Mariani, Oleg Boyarchuk, Stefano Ortolani & Giovanni Vigna (VMware) CTA Threat Intelligence Practitioners' Summit: 
Panel: Securing the future: the vital role of computer security vendors in an AI-driven world Samir Mody (K7), Abhishek Karnik (McAfee), Selena Larson (Proofpoint)
16:30 - 17:00 Into the Cumulus: Scarcruft bolsters arsenal for targeting individual Android devices Sebin Lee, Sojun Ryu, Hyeokju Gwon & Youngjae Shin (S2W)  Unveiling activities of Tropic Trooper 2023: deep analysis of Xiangoop Loader and EntryShell payload Suguru Ishimaru (ITOCHU Cyber & Intelligence), Hajime Yanagishita (MACNICA) & Yusuke Niwa (ITOCHU Cyber & Intelligence)  CTA Threat Intelligence Practitioners' Summit: 
Emotet in 2023: a comprehensive overview for decision makers on the resurgence, evolution and threat landscape Jonas Walker (Fortinet)
17:00 - 17:30     CTA Threat Intelligence Practitioners' Summit: 
Closing keynote Michael Daniel (Cyber Threat Alliance)
17:30 - 18:30  Posters will be displayed throughout the day in the conference foyer, with a poster presentation session at the end of the day.
19:30 - 23:00 VB2023 gala dinner & entertainment - featuring the world's number one ethical pickpocket!

Friday 6 October 2023

Time Green room Red room
Small Talks
09:30 - 10:00 Intent-based approach to detect email account compromise Abhishek Singh & Fahim Abbasi (Cisco) Magniber's missteps: because even spiders trip over their own web Amata Anantaprayoon & Patrik Olson (NTT Security Holdings) Panel discussion: Addressing the ransomware threat from outside the lab Chester Wisniewski (Sophos), Paul Ducklin (Independent), Samir Mody (K7), Kathi Whitbey (Palo Alto Networks) & Kathryn Sherman (FBI)
10:00 - 10:30 Generic script emulation Kurt Natvig (Acronis) Building a cybersecurity AI dataset for a secure digital society Bomin Choi, Juhyuk Kim & Hoseok Ryu (KISA - Korean Internet & Security Agency)
10:30 - 11:00 Tea/Coffee 
11:00 - 11:30 The Dragon who sold his Camaro: reversing a custom router implant Itay Cohen & Radoslaw Madej (Check Point)  It all makes sense if you don't think about it – misinformation in malware analysis Łukasz Siewierski (Independent researcher) WORKSHOP: Modern threat hunting presented by Fernando Diaz Urbano, VirusTotal

11:30 - 12:00 Turla and Sandworm come filelessly Alexander Adamov (NioGuard Security Lab) MEGALO-(414E)-DON: uncovering data espionage, blackmailing and shell companies in mobile lending apps Jagadeesh Chandraiah (Sophos)
12:00 - 12:30 Teasing the secrets from threat actors: malware configuration extractors Mark Lim & Zong-Yu Wu (Palo Alto Networks) Web3 will bite you in the Web 2.0: exploring IPFS threats Morton Swimmer (Trend Micro) 
12:30 - 14:00 Lunch 
14:00 - 14:30 The Dropping Elephant never dropped Ye Jin (Kaspersky) W3LL phishing kit – the tools, the criminal ecosystem, and the market impact Martijn van den Berk (Group-IB)  (Unless needed to replace a paper earlier on the programme) Silent whispers of malware: unveiling hidden threats in legitimate network traffic Royce (Chienhua) Lu (Palo Alto Networks)
 
14:30 - 15:00 Reinventing the steal: Arid Viper now with a Rusty flavour Matias Porolli (ESET) Corporate users in the crosshairs as malvertising gains momentum again Jérôme Segura (Malwarebytes)  (Unless needed to replace a paper earlier on the programme) Infostealers: investigate the cybercrime threat in its ecosystem Pierre Le Bourhis & Livia Tibirna (Sekoia.io)
15:00 - 15:30 Tea/Coffee 
15:30 - 16:10 Keynote address: The physics of information asymmetry Juan Andrés Guerrero-Saade (SentinelOne)
(takes place in the Green room)
16:10 - 16:20 Conference closing session  
(takes place in the Green room)
16:20 - 17:20  Posters will be displayed throughout the day in the conference foyer, with a poster presentation session at the end of the day.

*Reserve papers

Should these papers not be required to replace papers on the main programme, they will be presented in the Small Talks room on Friday 6 October.

 

Back to VB2023 conference page

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.