Star 0

Abstract

Wednesday 30 September 15:00 - 15:30, Green roomSantiago Pontiroli (Kaspersky Lab)
Roberto Martinez (Kaspersky Lab)  download slides (PDF)With the ubiquitous adoption of Microsoft's .NET and PowerShell frameworks, an ever increasing number of software development and IT ninjas have joined a nascent tradition of professionals leveraging these powerful environments for added efficacy in their everyday jobs. With a wide array of libraries and cmdlets at their fingertips, the need to reinvent the wheel is long forgotten.Of course, malware writers are not far behind - they too have seen the light and are eager to use these convenient tools against us. Whether it's for everyday ransomware or state-sponsored targeted campaigns, cybercriminals are now emboldened by a new arsenal that enables them to adapt with ease and agility. Are you ready to defend yourself against this emerging threat?It's time to understand our adversaries' capabilities. We'll analyse select in-the-wild malware samples, picking apart the inner workings of these dastardly creations. We'll introduce the cloaking mechanisms adopted by cybercriminals, moving beyond managed code in executed environments to the devious packers, obfuscators and crypters leveraged in conjunction with these powerful frameworks in order to baffle malware analysts and forensic investigators.Knowing is not enough; we must apply. Willing is not enough; we must do. With a plethora of post exploitation and lateral movement tools created and customized every day in rapid application development environments and high-level programming languages, defending against this kind of pervasive opponent is a full-time job.Click here for more details about the conference. 

Slides

Videos