Training Day
Plenary Sessions Day 1
Plenary Sessions Day 2
Training Day | |
---|---|
08:00 – 09:45 | Registration & Coffee |
09:45 – 14:00 | GB US How to Surf the Dark Web Like a Boss (or Eastern European) Gabriel Cirlig (HUMAN Security, GB); Lindsay Kaye (HUMAN Security, US) |
Plenary Sessions Day 1 | |
---|---|
08:00 – 09:30 | Registration & Coffee |
09:30 – 09:45 | US Jeff Bollinger (LinkedIn, US); Matthew Valites (SAP, US) |
09:45 – 10:30 | NL From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities Marina Bochenkova (Corbion Group BV, NL) |
10:30 – 11:15 | US PT CI/CD Security in Action: Strategies for Threat Detection and Response Julie Agnes Sparks (Datadog, US); Juvenal Araujo (Datadog, PT) |
11:15 – 11:30 | Sponsored Coffee Break |
11:30 – 12:15 | DK PepsiDog: Inside the Rise of a Professional Chinese Phishing Actor Ionut Bucur (CSIS Security Group A/S , DK); Stefan Tanase (CSIS Security Group A/S, DK) |
12:15 – 13:15 | Lunch at The W |
13:15 – 14:00 | NL Shadow Patching: Using AI to Discover Undisclosed Security Fixes in Open-Source Mackenzie Jackson (Aikido Security, NL) |
14:00 – 14:45 | AT Engineering the Loop: SAP's Journey to Continuous Behavior Testing Nikolas Dobiasch (SAP SE, AT) |
14:45 – 15:00 | Socialization Break |
15:00 – 15:45 | GH Monetisation of Cybercrime in Ghana’s Forestry Sector Anthony Yeboah Akoto (University College of Agriculture and Environmental Studies, GH); James Ofori (Kwame Nkrumah University of Science and Technology Kumasi, GH) |
15:45 – 16:30 | BR Guardians of Identity: Key Takeaways from Identity Theft Breaches Diego Matos Martins (IBM, BR) |
Plenary Sessions Day 2 | |
---|---|
08:00 – 09:30 | Registration & Coffee |
09:30 – 09:45 | US Gavin Reid (HUMAN Security, US) |
09:45 – 10:30 | CH In-Depth Study of Linux Rootkits: Evolution, Detection, and Defense Stephan Berger (InfoGuard AG, CH) |
10:30 – 11:15 | HR Vanja Svajcer (Cisco Talos, HR) |
11:15 – 11:30 | Sponsored Coffee Break |
11:30 – 12:15 | NL Incident Response in Kubernetes Environment Mahdi Alizadeh (Databricks, NL) |
12:15 – 13:15 | Lunch at The W |
13:15 – 14:00 | US A Security Professional’s Guide to Malicious Packages Kirill Boychenko , Philipp Burckhardt (Socket, US) |
14:00 – 14:45 | TR Scattered Spider's Cloud Tactics: Understanding the Ransomware Deployment Life Cycle Arda Büyükkaya (EclecticIQ, TR) |
14:45 – 15:00 | Socialization Break |
15:00 – 15:45 | NL Emanuele Mezzi (Vrije Universiteit Amsterdam / Ethikon Institute, NL); Fabio Massacci (Vrije Universiteit Amsterdam / University of Trento, NL); Katja Tuma (Vrije Universiteit Amsterdam, NL) |
15:45 – 16:30 | NL Old School Fraud in 2024: Without Ransomware but with Ransomware Precursor Rustam Mirkasymov, Vito Alfano (Group-IB, NL) |
Kirill Boychenko (Socket, US), Philipp Burckhardt (Socket, US)
This session reveals how attackers exploit typosquatting, author impersonation, and innovative malware campaigns to infiltrate software supply chains. Learn practical threat hunting methodologies, and gain step-by-step guides to detect, analyze, and defend against these malicious threats.
Kirill Boychenko is a Senior Threat Intelligence Analyst at Socket, where he specializes in threat hunting, malware analysis, and tracking software supply chain threats across npm, PyPI, Maven, RubyGems, and Go ecosystems. Prior to joining Socket, he served as a Threat Intelligence Analyst at Recorded Future’s Insikt Group on the Advanced Reversing, Malware, Operations, and Reconnaissance (ARMOR) team, where he analyzed new and emerging threats, malware, and TTPs while engineering detections. Before that, he worked at the United Nations, American Bar Association, and International Labor Rights Forum, coordinating international projects that mitigated human trafficking and corruption, and defended human and labor rights.
Philipp Burckhardt is Lead Data Scientist at Socket (socket.dev), where he is helping to secure software supply chains. Together with Athan Reines, he is engaged in the development of a standard library for JavaScript bringing numerical and statistical computing to the web (https://stdlib.io). An avid open-source contributor, he has spoken at various international conferences on topics ranging from political science, health-care informatics to machine learning and software engineering. He holds a PhD ins Statistics & Data Science from Carnegie Mellon University.
March 27, 2025 13:15-14:00
Vanja Svajcer (Cisco Talos, HR)
In recent times, ransomware actors have been increasingly using the Bring Your Own Vulnerable Driver (BYOVD) technique, but what does it actually mean? What types of drivers are suitable for BYOVD? Which drivers are they bringing and why? Which vulnerabilities are exploited and what is the purpose of exploiting them? How is it all done and which threat actors have been using them?
This presentation introduces BYOVD technique, digs deeper into driver vulnerabilities and their exploitation by ransomware threat actors. First, we investigate three primary classes of vulnerabilities in legacy Windows drivers abused by threat actors: arbitrary MSR writes, arbitrary kernel memory writes, and insufficient access controls. These vulnerabilities enable attackers to escalate privileges, load unsigned code, bypass EDR software and conduct other activities leading to the final payload.
We shift our focus on ransomware groups leveraging BYOVD for their operations, including Kasseika, Akira, Qilin, BlackByte, and RansomHub. We discuss BYOVD related TTPs of ransomware groups active in 2024.
Our session also briefly discusses Windows exploit mitigations designed to counter these threats. Features like Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), Kernel Control Flow Guard (kCFG), and kernel shadow stacks play crucial roles in enhancing system security.
We conclude with a section on detecting and preventing BYOVD from the point of view of blue team members, documenting sources of data and detection strategies.
By addressing both technical and operational aspects of BYOVD, this presentation emphasises insights for forensics experts, incident responders, and cyber threat researchers and provides knowledge for better research and detection of BYOVD based threats.
Vanja Svajcer works as a Threat Researcher at Cisco Talos. Vanja enjoys tinkering with automated analysis systems, reversing binaries and analysing mobile malware. He thinks time spent scraping telemetry data to find indicators of new attacks is well worth the effort. He presented his work at conferences such as FSec, Bsides, Virus Bulletin, RSA, CARO, AVAR, BalcCon and others.
March 27, 2025 10:30-11:15
Julie Agnes Sparks (Datadog, US), Juvenal Araujo (Datadog, PT)
Have you considered what an attacker could achieve if they infiltrated an environment filled with critical secrets and IP? Join this session to explore past attacks on CI/CD environments and discover how a CI/CD threat model can help you build detections and respond to these threats in the future.
Julie Sparks is a Threat Detection Engineer at Datadog under the Security Research team and has over 7 years of experience. She has previous experience working on Detection & Response teams at startups such as Cloudflare and Brex. In addition to threat detection work, her focus is on bringing folks into the cybersecurity field and mentoring women in the industry.
Juvenal Araujo is a Senior Cybersecurity Engineer specialising in threat detection at Datadog, where he develops critical detections for highly sensitive assets. With over eight years of experience spanning offensive security, threat intelligence, and programming, Juvenal has held key cybersecurity roles in renowned European organisations. He holds multiple industry certifications and a Master's degree in Electrical and Computer Engineering, where he focused on computer systems and networks, cryptography, and cybersecurity. He has contributed to academia through IEEE and has won first place on the national cybersecurity defense competition held by the Portuguese Armed Forces.
March 26, 2025 10:30-11:15
Nikolas Dobiasch (SAP SE, AT)
Starting a continuous security validation program in a complex enterprise environment requires thoughtful architecture, clear use cases, and systematic validation approaches. This talk shares SAP's journey in establishing our Breach and Attack Simulation foundation, focusing on how we approached detection validation, security control assessment, and advanced attack scenario testing. We'll explore our methodology for building a centralized Detection Lab, share our framework for staged validation, and discuss how we're preparing for Line of Business deployments. Through practical examples from our initial implementation phase, attendees will gain insights into building scalable security validation programs that can grow with enterprise needs. Learn how we approached infrastructure design, use case prioritization, and stakeholder alignment to create a strong foundation for enterprise-wide security validation.
Nikolas Dobiasch is a Cyber Defense Expert at SAP Austria, where he leads initiatives in security validation and detection engineering. His background includes heading cyber security at Vienna International Airport and conducting digital forensic investigations at Deloitte, bringing unique insights into defensive and offensive security operations. A GIAC-certified professional holding GCTD, GDAT and GCFR certifications, Nikolas focuses on building scalable adversary emulation and continuous behavior testing programs across complex enterprise environments.
March 26, 2025 14:00-14:45
Marina Bochenkova (Corbion Group BV, NL)
“Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities.
Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems. Smart Cities by nature use a combination of IT and OT systems but have no established or holistic approach for managing overlapping risks to both. The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined. Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors.
Smart Cities present a ubiquitous and unique combination of risks which must be comprehensively assessed in order to improve procedural and operational security, reliability, and resilience. By reframing our understanding of what Smart Cities are, we can use and integrate pre-existing actionable strategies to prepare and defend against threats ranging from pandemics to nation-state attacks. As politically motivated cyberattacks expand in reach and collateral radius, we need to prepare our cities for when they become the next battlefield.
This talk aims to expand our definition of Smart Cities; discuss the data, human, and technological risks that they face; and share resources on how to deal with them.
Marina Bochenkova wears many hats as a cybersecurity analyst focusing on digital forensics, incident response, and OT security, while also dabbling in security awareness and culture. She combines a passion for protecting people, a strong belief in digital privacy as a human right, and an overly-enthusiastic approach to problem-solving. When not defending digital spaces, Marina actively nurtures her already-unhealthy obsession with cats and resorts to baking or martial arts when desperate.
March 26, 2025 09:45-10:30
Diego Matos Martins (IBM, BR)
This presentation explores the analysis of a real-world Adversary-in-the-Middle (AiTM) attack, in which a threat actor successfully circumvented the Multi-Factor Authentication (MFA) of a Microsoft 365 account belonging to a global corporation. Following this breach, the attacker executed a Business Email Compromise (BEC) and escalated the attack by performing second-stage AiTM and BEC operations on additional targets from the initial victim's contact list.
In this talk, we will learn about:
LA X-Force Incident Response Leader at IBM
Diego Matos Martins is the Leader of Incident Response for IBM X-Force Latin America where he leads a team of security consultants focused on the areas of adversary trend analysis, incident response, threat hunting and investigation.
March 26, 2025 15:45-16:30
Gabriel Cirlig
Lindsay KayeGabriel Cirlig (HUMAN Security, GB), Lindsay Kaye (HUMAN Security, US)
Oh no, your infrastructure is getting attacked and worsening by the day. The attacks seem highly coordinated, but where do you even begin when trying to hunt down the attackers? Roll up your sleeves and get ready to slip down the rabbit hole into the shadowy corners of the internet. In this 4 hour, one-of-a-kind OSINT and large-scale data-collection workshop, we'll show you how to become the cyber-sleuth you never knew you could be - minus the trench coat and fedora (unless that's your style). We'll demystify the Dark and Dark Web, debunk those spooky legends, and give you tips and tricks to keep a low profile. We'll arm you with cunning tactics for safe lurking in onion-land, navigating sneaky marketplaces, and scraping massive heaps of intel while also staying legal! Expect a healthy dose of humour and enough practical know-how to impress your pet goldfish—and give you something to talk about while you wait for the next season of Love Island. Get ready to dive deep, stay safe, and come out the other side a certified data-diving rockstar!
Gabriel Cirlig - Software developer turned rogue, went from developing apps for small businesses to 2M+ DAU Facebook games while keeping an eye for everything shiny and new. For a couple of years I’ve shifted gears and started my career as a security researcher while speaking at various conferences (SAS, AVAR, PHDays) in my free time showcasing whatever random stuff I hacked. With a background in electronics engineering and various programming languages, I like to dismantle and hopefully put back whatever I get my hands on.
Lindsay Kaye is the Vice President of Threat Intelligence at HUMAN Security. Her technical speciality and passion is reverse engineering. Lindsay holds a BS in Engineering with a Concentration in Computing from Olin College of Engineering and an MBA from Babson College.
March 25, 2025 09:45-14:00
Stephan Berger (InfoGuard AG, CH)
This talk, "In-Depth Study of Linux Rootkits," will provide a comprehensive examination of the evolution of Linux rootkits, from their inception to the sophisticated variants seen today.
Participants will gain insights into advanced rootkit techniques, effective detection strategies, and the future landscape for defenders. By exploring the historical context, current methodologies, and emerging threats, attendees will have the knowledge and tools necessary to safeguard Linux systems against rootkit attacks.
Beginning with an introduction to the fundamental capabilities of Linux rootkits, this talk traces the history of these malicious tools from their origins to their increasingly sophisticated techniques. It categorizes rootkits into kernel-level, user-mode, and hybrid types, explaining their respective methods for hooking kernel functions, intercepting user-space processes, and combining techniques from both realms. The discussion includes an analysis of rootkit persistence mechanisms and stealth techniques, which allow them to remain undetected.
Next, we shift to detection strategies, starting with signature-based detection, which involves identifying known rootkits through specific patterns but also addresses the limitations of this approach. It explores behavioral analysis by monitoring system anomalies and presents case studies demonstrating the effectiveness of this method. The importance of integrity checking is highlighted, emphasizing the challenges in maintaining accurate baselines for system files and binaries.
Furthermore, this talk reviews advanced detection tools and frameworks, providing an overview of popular rootkit detection tools and practical demonstrations of their use. This comprehensive analysis underscores the ongoing battle between rootkit developers and cybersecurity professionals, emphasizing the need for continuous advancements in detection and mitigation techniques.
Stephan Berger has over a decade of experience in cybersecurity. Currently working with the Swiss-based company InfoGuard, Stephan investigates breaches and hacked networks as Head of Investigation of the Incident Response team. An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response. Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.
March 27, 2025 09:45-10:30
Mahdi Alizadeh (Databricks, NL)
Kubernetes has become a critical component of modern production environments, valued for its scalability, flexibility, and ability to streamline container orchestration. However, its complexity and dynamic nature present unique challenges for security incident response. A compromised Kubernetes environment can provide attackers with substantial computational resources and access, enabling activities such as data exfiltration, intellectual property theft, or cryptocurrency mining.
Incident response in Kubernetes requires specialized knowledge, as traditional security practices often fall short in addressing the nuances of containerized systems. For example, the ephemeral nature of containers, combined with limited logging and monitoring practices and insufficient support from detection tools, makes it challenging to detect, contain and respond to incidents effectively. Many security teams are unfamiliar with Kubernetes-specific attack vectors and lack the expertise needed to respond to breaches in such environments.
This presentation will first provide examples of Kubernetes attack chains and highlight techniques—such as privilege escalation through "bad pods"—that are specific to this environment. It will then review critical logs that should be collected and explain how disk and memory forensics can aid in incident response. It will also discuss the challenges that a team might face during the analysis.
Mahdi Alizadeh has 13 years of experience in computer security, spanning both academia and industry. He earned his Ph.D. in computer security from Eindhoven University of Technology. Throughout his career, he has worked in various security operations teams, serving as a security analyst, detection engineer, and security manager.
March 27, 2025 11:30-12:15
Fabio MassacciEmanuele Mezzi (Vrije Universiteit Amsterdam / Ethikon Institute, NL), Fabio Massacci (Vrije Universiteit Amsterdam / University of Trento, NL), Katja Tuma (Vrije Universiteit Amsterdam, NL)
Several recent works have argued that Large Language Models (LLMs) can be used to tame the data deluge in the cybersecurity field, by improving the automation of Cyber Threat Intelligence (CTI) tasks.
We present an evaluation methodology that other than allowing to test LLMs on CTI tasks when using zero-shot learning, few-shot learning and fine-tuning, also allows to quantify their consistency and their confidence level. We run experiments with three state-of-the-art LLMs and a dataset of 350 threat intelligence reports and present new evidence of potential security risks in relying on LLMs for CTI.
We show how LLMs cannot guarantee sufficient performance on real-size reports while also being inconsistent and overconfident. Few-shot learning and fine-tuning only partially improve the results, thus posing doubts about the possibility of using LLMs for CTI scenarios, where labelled datasets are lacking and where precise confidence model estimates are necessary to rely on LLMs predictions.
Fabio Massacci (MEng’92, PhD’98 Computer Engineering, MA’95 in International Relations), married with two children, has been in Rome, Cambridge, Toulouse, Trento, and Amsterdam. He held visiting positions in Durham, Koblenz, Lueven, Marina del Rey, and Oslo. For a full biography on Fabio, see this page: https://fabiomassacci.github.io/
Emanuele Mezzi is researcher at VU Amsterdam and TNO, where he focuses on the applications of AI to cybersecurity and threat intelligence. Concurrently he is also co-founder and AI Lead Researcher at Ethikon Institute, where he focuses on the development of methodologies to make LLMs explainable and trustworthy. Emanuele holds a BSc in Computer Science from the University of Salerno and an MSc in Data Science from the University of Amsterdam
Katja Tuma is a co-speaker for this session.
March 27, 2025 15:00-15:45
Anthony Yeboah Akoto (University College of Agriculture and Environmental Studies, GH), James Ofori (Kwame Nkrumah University of Science and Technology Kumasi, GH)
Cybercrime has emerged as a major global concern, with increasing instances of online threats impacting various sectors. In Ghana, the forestry sector, which plays a pivotal role in the country’s economy, has not been immune to the effects of cybercrime. This study investigates the monetisation of cybercrime within Ghana's forestry sector, focusing on how illegal activities are financially sustained through digital platforms and their effects on the industry. Specifically, it explores the extent to which cybercriminals exploit forestry data, illegal timber trade, and logging activities through cyber means. The research addresses several key questions: How are cybercriminals monetising illegal activities in Ghana’s forestry sector? What are the prevalent cybercrime methods used in forestry-related crimes? How do these cybercrimes affect the sustainability of the forestry industry? What measures are being implemented to mitigate these crimes? To answer these questions, a mixed-method approach is employed, combining qualitative and quantitative techniques. Data is gathered through interviews with forestry experts, cybersecurity professionals, and law enforcement, alongside a survey of forestry businesses and government agencies. Additionally, the study uses secondary data from reports on cybercrime and forestry management in Ghana.
The results indicate that cybercriminals are exploiting gaps in the digital infrastructure of the forestry sector to facilitate illegal logging, timber trafficking, and the falsification of forestry-related documents. These crimes often involve phishing, hacking of logging permits, and the manipulation of satellite data used for forest monitoring. The financial benefits gained by criminals from such activities are significant, contributing to the growth of illegal timber trade and undermining legal and sustainable forestry practices. The monetisation of cybercrime within Ghana's forestry sector poses serious risks to both the economy and environmental sustainability. There is a critical need for enhanced cybersecurity measures, stricter law enforcement, and the integration of technology-driven solutions to curb these activities. Further research is needed to develop effective strategies to protect the sector from cyber threats while promoting sustainable practices in forestry management.
Anthony Yeboah Akoto is a skilled development policy and planning professional with a strong background in climate change, biodiversity, and natural resource management. He holds an MSc in Development Policy and Planning from Kwame Nkrumah University of Science and Technology, Ghana, and has worked in both academia and public service. Anthony has served as an Assistant Lecturer at the University College of Agriculture and Environmental Studies and held various roles in the Ghana School Feeding Programme and the Ghana AIDS Commission. He is a member of multiple professional organizations, including the Citizen Science Association and the Ghana Geographical Association.
James Ofori is a dedicated professional with expertise in forest ecosystems, conservation, and land management. He holds an MSc in Conservation and Land Management from Bangor University and an MSc in Forest Ecosystems from Copenhagen University. James has conducted significant research on the impacts of biodiversity on human wellbeing and the local democracy effects of forestry interventions in Ghana. With extensive experience in environmental governance, data collection, and analysis, he has worked with notable institutions like the Forestry Research Institute of Ghana (FORIG) and CODESRIA. James is passionate about promoting good governance in natural resources management for sustainable development.
March 26, 2025 15:00-15:45
Rustam MirkasymovRustam Mirkasymov (Group-IB, NL), Vito Alfano (Group-IB, NL)
This is a a story-telling presentation about an unknown group spreading Latrodectus, and all its modules, to operate an espionage attack, which was concluded with a money theft. We are going to show how Threat Intelligence can speed up incident response procedures and assist in identifying other victims and active malicious infrastructure.
Rustam Mirkasymov has 10 years of experience in the fields of in cyber threat research and threat intelligence, strong skills in reverse engineering, and an in-depth understanding of the mechanisms of software vulnerabilities. He has been involved in global cybercrime investigations, contributing to research on threat actors and the attribution of specific cyber-attacks. The author of APT reports (including Lazarus, Silence, Cobalt, RedCurl and OPERA1ER).
Vito Alfano is a specialist in Digital Forensics, Incident Response, Vulnerability Management Cyber Threat Intelligence, Threat Hunting, Security Awareness and Secure Networks Design with 15+ years of experience in the field and tons of projects completed in different regions (Europe, APAC, US, MEA) and investigating and responding to hundreds of security incidents, primarily related to APTs and Cybercrime, in intergovernmental organizations, space and defense entities and in the banking sector.
March 27, 2025 15:45-16:30
Ionut Bucur (CSIS Security Group A/S , DK), Stefan Tanase (CSIS Security Group A/S, DK)
Building on last year’s investigation into a massive Chinese package redelivery smishing syndicate, this presentation delves deeper into one of the key actors briefly touched on in the previous research.
PepsiDog is a threat actor that exemplifies a new level of professionalism, operating as a “developer-first” entity in the phishing ecosystem. By selling advanced phishing kits and offering phishing-as-a-service (PhaaS), they provide tools that enable global targeting of individuals and institutions, often through package redelivery scams.
This research highlights how this actor differs from others in scale, sophistication, and operational structure, demonstrating the ongoing evolution of threat actor capabilities. A day in the life of a threat researcher investigating this group will offer attendees a behind-the-scenes look at the challenges of unraveling their operations.
Additionally, we’ll explore their technical innovation, the expanded adoption of new cash-out mechanisms, and how their kits are being sold and deployed globally.
Key findings and updates for attendees include:
Insights into how this actor designs and markets phishkits to other criminal groups, enabling widespread and efficient phishing campaigns.
A peek inside the panel demonstrating of the actor’s sophisticated phishing kit, including their modular and customizable features designed for global targeting.
Analysis of the steadily increasing number of compromised credentials and financial data linked to this actor’s operations over the past year.
Examination of the actor’s growing influence and their collaboration with other Chinese groups exhibiting similar tactics, techniques, and procedures (TTPs).
This session, tailored for both technical and non-technical audiences, will provide actionable insights into the professionalization of cybercrime and offer strategies for detecting and defending against such advanced threats.
Stefan Tanase is an experienced security researcher based in Bucharest, Romania. Having spent the last two decades combating the world’s most sophisticated cyber threats, Stefan joined CSIS Security Group in 2019 as Cyber Intelligence Expert, part of the eCrime Unit. Through innovative research projects and effective public speaking engagements, he actively contributes to keeping internet users safe. While Stefan specializes in collecting threat intelligence and monitoring the cybercrime ecosystem, he has a real passion for digital rights and internet privacy.
Ionut Bucur is a co-speaker for this session.
March 26, 2025 11:30-12:15
Arda Büyükkaya (EclecticIQ, TR)
In today's cloud-centric business landscape, cyber threat actors are increasingly targeting cloud infrastructures to conduct high-impact ransomware attacks. This presentation delves into the tactics, techniques, and procedures (TTPs) of the threat actor known as Scattered Spider, with a focus on understanding their ransomware deployment life cycle within cloud environments.
Drawing from in-depth research and real-world case studies targeting the insurance and financial sectors, we will explore how Scattered Spider employs advanced social engineering methods—such as voice phishing (vishing) and SMS phishing (smishing)—to compromise high-privileged accounts like IT service desk administrators and identity administrators. The session will examine their use of SIM swapping to bypass multi-factor authentication (MFA) and gain unauthorized access to critical cloud services and Software as a Service (SaaS) platforms.
We will uncover how Scattered Spider leverages legitimate cloud features, including Cross-Tenant Synchronization in Microsoft Entra ID and federated identity providers, to establish persistent access and escalate privileges within compromised environments. The talk will highlight their use of open-source tools for cloud reconnaissance, their methods for impairing security tools, and their strategies for evading detection—such as utilizing remote monitoring and management (RMM) tools, protocol tunneling, and creating unmanaged virtual machines.
Furthermore, the presentation will dissect Scattered Spider's ransomware deployment strategies targeting cloud Infrastructure as a Service (IaaS) platforms like VMware ESXi. We will discuss their automated deployment tactics, and cloud-native tools to execute ransomware payloads efficiently, making recovery efforts more challenging for victims.
By mapping out Scattered Spider's comprehensive attack life cycle—from initial cloud account compromise to ransomware execution—we aim to equip cybersecurity professionals with actionable insights to bolster their cloud security posture. The session will conclude with prevention opportunities, offering best practices in authentication and account security, cloud environment hardening, and detection queries to identify and mitigate malicious activities.
Key Takeaways:
Arda Büyükkaya is a Senior Cyber Threat Intelligence Analyst with experience in advanced threat analysis, proactive threat hunting, and incident response. Specialized in tracking financially motivated cybercriminals and nation-state actors. Authored intelligence reports uncovering novel adversary tactics, techniques, and procedures (TTPs), providing actionable intelligence that supports Fortune 500 companies and government entities in enhancing their threat detection and response strategies.
March 27, 2025 14:00-14:45
Mackenzie Jackson (Aikido Security, NL)
Silent patching—fixing security vulnerabilities without disclosure—presents a critical blind spot in software supply chain security. With 1 in 6 vulnerabilities patched silently, traditional security tools relying on public vulnerability databases like CVE or NVD fall short, leaving organizations exposed to unknown risks. This presentation introduces an entirely novel approach that harnesses the power of Large Language Models (LLMs) to detect these hidden vulnerabilities in open-source software.
We'll show how our novel dual-LLM architecture analyses public changelog data to identify and classify silently patched vulnerabilities. Through a live demo, we'll show how this AI-driven method has allowed us to uncover hundreds of previously unknown vulnerabilities in major open-source projects, with 20% classified as critical or high severity.
Key points:
Mackenzie Jackson is a security researcher and advocate with a passion for code security. He is the former CTO and founder of Conpago, where he learned firsthand the importance of building secure applications. Today, Mackenzie works for Aikido security to help developers and DevOps engineers build secure systems. He also shares his knowledge as a contributor to many technology publications like DarkReading, Financial Times, and Security Boulevard along with appearing as an expert in TV documentaries and interviews.
March 26, 2025 13:15-14:00
Jeff Bollinger
Matthew ValitesJeff Bollinger (LinkedIn, US), Matthew Valites (SAP, US)
With over twenty years of information security experience, Jeff Bollinger has worked as security architect, incident responder, and people manager for both academic and enterprise networks. Specializing in investigations, network security monitoring, detection engineering, log analysis, and intrusion detection, Jeff Bollinger is the Director of LinkedIn's incident response team (SEEK). Prior to LinkedIn, Jeff helped build and operate one of the world's largest corporate security monitoring infrastructures at Cisco Systems. Jeff regularly speaks at international FIRST conferences, blogs about security topics. He is also the co-author of "Crafting the InfoSec Playbook". Jeff's recent work includes log mining, search optimization, cloud threat research, and security investigations.
Matt has spent the past 15+ years in various security roles spanning leadership, operations, investigations, field sales, and research. Currently leading Threat Detection Operations and Operational Strategy at SAP's Global Security Operations, he's spent most of his career in the Enterprise Software-as-a-Service space. He's a co-author of O'Reilly's Crafting the Infosec Playbook and a longtime active member of the FIRST organization.
March 26, 2025 09:30-09:45