December 9 - Keynote Speeches and Lectures
December 10 - Lectures and Hands-On Training - Technical Track
December 10 - Lectures and Hands-On Training - Workshop Track
December 9 - Keynote Speeches and Lectures | |
---|---|
12:00 – 13:00 | Registration |
13:00 – 13:15 | Welcome to FIRST TC Ljubljana Head of SI-CERT & TC organizers |
13:15 – 14:00 | NL SAETI: State-Actor Empowered Threat Intelligence... A Good or a Bad thing? Righard Zwienenberg (ESET, NL) |
14:00 – 14:45 | AT TLD ISAC - Information Sharing and Cooperation in the Domain Industry Robert Schischka (nic.at, AT) |
14:45 – 15:15 | Coffee |
15:15 – 16:00 | BE Listen, Observe, Analyze: Overcoming Biases in Infosec Investigations Xavier Mertens (Xameco SRL, BE) |
16:00 – 16:45 | US When Your CTV Box Goes Rogue: How Millions Were Tricked Into Aiding a Global Cybercrime Operation Lindsay Kaye (HUMAN Security, US) |
16:45 – 17:00 | Closing Remarks TC Organizers |
December 10 - Lectures and Hands-On Training - Technical Track | December 10 - Lectures and Hands-On Training - Workshop Track | |
---|---|---|
09:00 – 09:45 | PL Using DNS Registry and Requests for Securing .pl TLD and Beyond Paweł Pawliński, Piotr Białczak (CERT.PL/NASK, PL) | Threat Hunting Tools CIRCL 09:00 – 12:30 |
09:45 – 10:30 | TW Residential Proxy Networks Uncovered: Infrastructure & Insider Stories Fyodor Yarochkin (Trend Micro, TW) | |
10:30 – 11:00 | Coffee | |
11:00 – 11:45 | CA Persōna Theory: Infiltration & Deception of Emerging Threat Groups Tammy Harper (Flare, CA) | |
11:45 – 12:30 | PL Collaborative Response to Emerging Critical RCE Vulnerabilities in Exposed Assets Piotr Kijewski (Shadowserver, PL) | |
12:30 – 14:00 | Lunch | |
14:00 – 14:45 | HU Gabor Szappanos (Sophos, HU) | CA Hands-On Data Breach Investigation with the Dark Net Tammy Harper (Flare, CA) 14:00 – 17:00 |
14:45 – 15:30 | CZ Modern Network Fingerprinting: from p0f to MuonFP & JA4 Vlad Iliushin (ELLIO / AMTSO , CZ) | |
15:30 – 16:00 | Coffee | |
16:00 – 16:45 | TBD | |
16:45 – 17:00 | Closing Remarks |
Piotr KijewskiPiotr Kijewski (Shadowserver, PL)
This talk will tell the story of how The Shadowserver Foundation has responded to many recent high-profile critical vulnerabilities such as Citrix NetScaler (CVE-2023-3519 etc), Cisco IOS XE device implants (CVE-2023-20198), Fortinet Fortigate (CVE-2024-23113), Palo Alto PanOS (CVE-2024-0012) etc, and others affecting tens of thousands of organizations globally. This includes how we worked on new vulnerability scans on an Internet scale to be able to quickly detect exposed, vulnerable or compromised instances and understand the scale of each incident. It will also cover how we improved our attack detection signatures and utilized our global honeypot sensor network to be able to quickly detect exploitation attempts and help identify webshells on compromised or incompletely remediated devices. All information gathered was then quickly disseminated to the affected parties, their National CSIRTs, and Law Enforcement (where appropriate) via our free remediation feeds. None of that would be possible without close collaboration with multiple partners who provided a lot of information observed "on-the-ground", which we could combine with our own data collection mechanisms to maximize remediation effects. We will cover the lessons learned from this collaboration, which will hopefully allow for even more effective response from the community in future incidents.
Piotr Kijewski is the CEO and a Trustee at The Shadowserver Foundation, a non-profit organization with a mission of making the Internet a more secure environment. He also manages Shadowserver's large-scale data threat collection and sharing projects, as well as National CSIRT relationships. Piotr has over 20 years of operational experience in cybersecurity and incident response. He headed CERT.PL building up its various security data gathering and analysis projects as well as managing its anti-malware operations, including numerous botnet disruptions. Piotr is also a member of the Honeynet Project (where he has also served on the Board of Directors), a well-known and respected non-profit that is committed to the development of honeypot technologies and threat analysis. Piotr Kijewski is a member of the Management Board of The Hague Chapter of the CyberPeace Institute.
December 10, 2025 11:45-12:30
Tammy HarperTammy Harper (Flare, CA)
In this simulation, your company has just experienced a breach. You need to find sensitive data that has been leaked. This information must not fall into the wrong hands. You will need to search the dark and clear web, forums, marketplaces, ransom listings, etc. to uncover these threats. Get to the bottom of this to protect employees and avoid millions of dollars spent on damage control.
Tammy Harper is a Senior Threat Intelligence Researcher and Certified Dark Web Investigator at Flare. She is a contributor and volunteer threat intelligence researcher for the open-source project RansomLook. When not working on threat intelligence, she listens to techno and ambient music. Her other hobbies include street and nature photography, reading, camping, hiking, and learning about theoretical astrophysics, hypothetical stars, and exotic forms of matter.
December 10, 2025 14:00-17:00
Gabor Szappanos (Sophos, HU)
It all started with investigating an incident from a user. The threat actor abused one of our components by overwriting the entry-point code and inserting the encrypted payload – impersonating a legitimate file, using it as carrier in an attempt to sneak onto systems.
It is not unusual that the malicious code is hidden behind legit applications, most commonly achieved by process injection or DLL side loading, but this case was an approach we haven’t seen before. As we looked deeper, it turned out that we were not alone. We found hundreds of similar carriers from dozens of software vendors, including many security companies.
Moreover, we identified two distinct operations that follow the same general scheme: legitimate binaries of software vendors were modified by overwriting the code near the entry point with a loader shellcode, encrypted malicious payload is inserted as a resource (the encryption is simple XOR with a static key), the payloads are delivered via phishing messages, final payload are commodity RATs or credential stealers.
Going down to the details however showed that there were enough differences (different payload injection, different payloads, different focus selecting the impersonated software vendors to nam a few) for us to think that it the two operations belongs to separate threat actors.
Both operations featured a large selection of malicious payloads including the usual initial access families, RATs and credential stealers. But interestingly, these families were totally different between the two. The first one used commonly deployed RATs (Cobalt Strike, Brute Ratel, Qakbot), and also some newcomers (Latrodectus, Oyster, SSLoad), and showed connections to ransomware groups like Black Basta and BlackSuit. The second operation mostly delivered Remcos, Lumma Stealer, AsynRAT, Rhadamanthys, XWorm and Vidar. Later this operation was identified by Unit42 as related to the HeartCrypt packer as a service offering. We also found that some of the abused binaries got resigned by a digital code certificate (the original signature was corrupted when the malicious code was inserted). As we followed this trail, further abused digital signatures were found.
These certificates had a few commonalities: they were used only used to sign binaries from the threat actors (which indicated that the adversary registered it for themselves), were all registered on behalf of small businesses, and the validation period lasted for a year only. So the threat actors didn’t only impersonate software developers by the carrier executables, but also small businesses for the certificates.
In this presentation we will explain how the original components were modified during the injection process, analyze the payloads, and explain the full infection chain in detail from the initial phishing email to the system compromise.
We will also give an insight into tools and techniques we used while collecting the information and the malicious samples from public sources and internal telemetry. We will also go through the process of reconstructing the full infection chains, which required using information from public reports, threat intelligence sources and our internal data.
Gabor Szappanos, Sophos. Gabor graduated from the Eotvos Lorand University of Budapest with degree in physics. His first job was in the Computer and Automation Research Institute, developing diagnostic software and hardware for nuclear power plants. He started antivirus work in 1995, and has been developing freeware antivirus solutions in spare time. He joined VirusBuster in 2001 where he was responsible for taking care of macro virus and script malware. Since 2002 he was the head of the virus lab. Between 2008 and 2015 he was a member of the board of directors in AMTSO (Anti Malware Testing Standards Organizations). In 2012 he joined Sophos where he works as a Threat Research Director.
December 10, 2025 14:00-14:45
Xavier MertensXavier Mertens (Xameco SRL, BE)
When we are performing investigations (threat intel, hunting, forensics, malware analysis or anything else), our path is full of pitfalls or more commonly called, “biases”. We do you day to day job, we have our tools, processes and follow playbooks but are we certain that we are not missing crucial informations? In the first half of the talk, I'll explain how we can improve and use our senses in a better way: observe instead of see, listen instead of hear, etc. In the second part, I'll review some common issues that people do when performing malware analysis with real examples that I observed here and there. Even if the abstract mentions “malware analysis”, this is not a very technical talk but it will be helpful for all infosec practitioners.
Xavier Mertens is a freelance security consultant running his own company based in Belgium (Xameco). With 20+ years of experience in information security, Xavier finds “blue team” activities more attractive. Therefore, his day job focuses on protecting his customers' assets by providing services like incident handling, malware analysis, forensic investigations, log management, security visualization, and OSINT). Besides his day job, Xavier is also a Senior Handler at the SANS Internet Storm Center, Certified SANS Instructor (FOR610, FOR71), security blogger and co-organizer of the BruCON security conference.
December 9, 2025 15:15-16:00
Vlad IliushinVlad Iliushin (ELLIO / AMTSO , CZ)
As scanning and reconnaissance methods grow more diverse - from public platforms like Shodan and Censys to hidden probing by botnets and bulletproof hosting services - security teams need better ways to understand who is on the other side of their network connections. This talk will show how network fingerprinting has developed over time, starting with simple tools like p0f and moving up to more advanced methods like JA4, JA4+, and MuonFP. We’ll discuss how these modern fingerprints can help analysts recognize the tools and infrastructure used by attackers, whether they are fast scanners, basic banner grabbers, or connections routed through VPNs and jump servers. You’ll learn how to use these fingerprints to strengthen your defenses, protect critical infrastructure, and reduce your visibility to public scanners. We will also explain how to fit fingerprinting into SOC and CSIRT workflows, noting both what it can and cannot do. Attendees will leave with a practical understanding of modern fingerprinting techniques and a few examples they can apply in their daily work.
Vlad Iliushin is co-founder of ELLIO, a research lab transforming exploitation and reconnaissance data into actionable threat intelligence and defense techniques. A cybersecurity enthusiast passionate about network security, IoT, and cyber deception, he serves as President of AMTSO. Previously, he founded and led the Avast IoT Lab (now part of Gen Digital). A speaker at BSides, HackTheBay, Web Summit, and SXSW, at ELLIO he leads development of its threat intelligence platform.
December 10, 2025 14:45-15:30
Tammy HarperTammy Harper (Flare, CA)
This talk explores various techniques, tactics, and psychological models used to infiltrate emerging threat actor groups. We will examine the process of target identification and discuss when it is appropriate to attempt infiltration. Additionally, we take a closer look at the concept of probing the enemy and the idea of weaponizing new relationship energy (NRE), which can be effective at destabilizing individuals and placing them outside of their comfort zones. An important aspect of Persona Theory is not only what we write but also how we present it. Stylometric analysis can be particularly useful in this area. We will compare transliteration and translation (both human and machine) to understand how to pass as a native speaker.
Tammy Harper is a Senior Threat Intelligence Researcher and Certified Dark Web Investigator at Flare. She is a contributor and volunteer threat intelligence researcher for the open-source project RansomLook. When not working on threat intelligence, she listens to techno and ambient music. Her other hobbies include street and nature photography, reading, camping, hiking, and learning about theoretical astrophysics, hypothetical stars, and exotic forms of matter.
December 10, 2025 11:00-11:45
Fyodor YarochkinFyodor Yarochkin (Trend Micro, TW)
In this session we will dive into business of residential proxies and will explore how are the residential proxies sourced, how do residential proxy sellers build their infrastructure. We look behind the veil of a few prominent sellers and examine the ecosystem behind. Discuss use cases of use and abuse of residential proxies by criminals including campaigns of information scrapping, credit card and crypto fraud, credentials harvesting and account brute force and finally, examine the difficulties of dealing with residential proxies from the defender role and discuss the possibilities of detecting residential proxy traffic as well as strategies for risk mitigation.
Fyodor Yarochkin is a Senior Researcher, Forward-Looking Threat Research Senior at Trend Micro with a Ph.D. from EE, National Taiwan University. An early Snort Developer and Open Source Evangelist as well as a Programmer, his professional experience includes several years as a threat investigator and over eight years as an Information Security Analyst
December 10, 2025 09:45-10:30
Righard ZwienenbergRighard Zwienenberg (ESET, NL)
State-Actor Empowered Threat Intelligence (SAETI) represents a potent blend of government resources and cybersecurity expertise aimed at identifying, assessing, and mitigating threats in cyberspace. On the positive side, SAETI can significantly enhance national security by providing comprehensive insights into potential cyberthreats from hostile states, criminal organizations, and terrorist groups. Governments can leverage their vast resources, including advanced technologies and intelligence networks, to gather and analyze data more effectively than private entities can. This level of threat intelligence can lead to more robust defense mechanisms, better-prepared responses to cyber incidents, and a more secure digital infrastructure for both public and private sectors.
But the empowerment of state actors in threat intelligence also raises several concerns. One major issue is the potential for abuse of power and overreach. State actors with extensive surveillance capabilities might infringe on citizens' privacy and civil liberties under the guise of national security. The “centralized” control over threat intelligence might lead to a lack of transparency and accountability, making it difficult to ensure that such powers are not misused. There is a risk that the focus on national security could lead to the suppression of dissent and the targeting of political opponents, thereby undermining democratic values. And it can also cause private organizations to lose visibility as they will lose telemetry possibilities, such as with the EU regulated “electronic IDentification, Authentication and trust Services”, or short: eIDAS.
A significant drawback is the international implications of SAETI. When state actors engage in cyber¬operations, it can escalate tensions between nations and contribute to an ongoing cyber ¬arms race. Countries might feel compelled to enhance their own cyber capabilities in response, leading to an environment of mutual distrust and increased cyberconflict. This can also complicate diplomatic relations and international cooperation on cybersecurity issues; Instead of fostering a collaborative approach to securing cyberspace, the involvement of state actors may lead to a fragmented and adversarial global landscape. Information professionals in the public sector have the Code of Ethics, established by the International Federation for Information Processing (IFIP) in 2020. Almost all affiliated organizations for information professionals endorse this code as a basis and guideline for methods, best practices, standards, and frameworks. The question is whether state-affiliated actors can and will use a code similar to the one that provides confidence in the private sector. Join us while we take a tour having a look at all the good and bad things of SAETI, where of course a flashback to ancient and historical intelligence services is not forgotten, as we always must learn from past mistakes, right?
Righard Zwienenberg began his work with computer viruses in 1988 after encountering his first virus issues at the Technical University of Delft. This experience sparked his interest in virus behavior, leading him to study and present solutions and detection methods ever since. Over nearly four decades, he has worked for various companies, including CSE Ltd., ThunderBYTE, Norman, and ESET. He has also held or continues to hold positions in several industry organizations, such as AMTSO, AVAR, the WildList, IEEE ICSG, and serves on the Advisory Board for Europol’s European Cyber Crime Center (EC3) and Virus Bulletin. He also runs his own computer security consultancy company (RIZSC). Zwienenberg has been a member of CARO since late 1991. He is a frequent speaker at conferences, including Virus Bulletin, EICAR, AVAR, FIRST, APWG, RSA, InfoSec, SANS, CFET, ISOI, SANS Security Summits, IP Expo, government symposia, SCADA seminars, and other general security events. Beyond his professional work in security, his hobbies include playing drums, performing magic, modeling balloons, restoring ancient computers, and much more.
December 9, 2025 13:15-14:00
Robert Schischka (nic.at, AT)
Close Cooperation and open discussions has always been a core value of CENTR - the association of European country code top-level domain (ccTLD) registries, especially as they usually perceive their peers not really as competitors in a strict way.
As the DNS is at the core of almost all internet communication, registries and DNS providers are considered essential services and more an more in the focus of regulation and legal requirements (eg. NIS2) but also attackers of all kinds.
To face this challenges and foster information exchange, CENTR formed a TLD ISAC as a subgroup within the CENTR organization, focused on threat intelligence and incident reports but also experiences with establishing security operations within the organization and common projects like exercises, pentests or drafting a sector specific threat landscape. This talk will give some insights in the experiences we gained in the first 3 years of setup and operation of this ISAC and the roadmap planned.
Robert Schischka studied business economics at the University of Economics in Vienna, specializing in commercial information technology and controlling. His professional focus is within the topics of IT strategy, architecture, infrastructure and IT security. He gained his profound experience as a security expert during his occupation in a subsidiary company of the Austrian National Bank and as a consultant with the internationally active IT-consulting company CSC. He has been CEO of nic.at since September 2003, where he is responsible for the technical operation. And since 2008 is director of the national Computer Emergency Response Team ( CERT.at). He is currently cochairing the European Financial ISAC (FI-ISAC) and TLD-ISAC Steering Committee at CENTR - the association of European country code top-level domain (ccTLD) registries.
December 9, 2025 14:00-14:45
Piotr BiałczakPaweł Pawliński (CERT.PL/NASK, PL), Piotr Białczak (CERT.PL/NASK, PL)
Detecting and mitigating phishing on a country scale is a big part of our operations at CERT.PL. In this talk we will share our experiences with applying machine learning to identify suspicious sites using the .pl registry data and DNS traffic observed at the resolver level. We will compare results of different approaches to proactive detection of phishing domains and benchmark our work against alternative solutions. Deploying machine learning tools in production is often challenging and we will share how we integrated new monitoring capabilities with a country-wide DNS firewall, serving millions of users. Our lessons learned can be useful for operators of DNS infrastructure and anyone interested in translating large volumes of data into indicators.
Piotr Białczak is a researcher at CERT.PL. His professional interests include network traffic analysis, phishing detection, and applying machine learning to security problems.
Paweł Pawliński is a principal specialist at CERT.PL. His job experience includes data analysis, threat tracking and automation. He is always looking for better ways to collect, leverage and share CTI.
December 10, 2025 09:00-09:45
Lindsay KayeLindsay Kaye (HUMAN Security, US)
Sometimes, you disrupt a massive fraud operation only for it to return bigger and stronger two years later. That's what HUMAN Security found with the successor to the original BADBOX campaign. BADBOX 2.0 targets millions of victims with more backdoor variants, more fraud schemes, and more sophistication than ever before. The China-based threat actors created an entire fraud ecosystem, infecting over 1 million consumer devices with a backdoor in over 200 countries and territories. BADBOX 2.0 is the largest botnet of infected connected TV devices ever uncovered and represents a significant evolution in cybercrime in which multiple types of fraud co-occur. This talk will dive into all of the details of BADBOX 2.0, including its interconnected nature, how threat actors target the entire customer journey, and how it can be impossible to thwart crimes like this without proper protection. HUMAN’s Satori Research team will present the technical intricacies, including the backdoor techniques, infection vectors, monetization strategies, and the infrastructure that enabled threat actors to hijack millions of devices worldwide, in addition to BADBOX’s implications for the Internet and how the company worked to stop it.
Lindsay Kaye is the Vice President of Threat Intelligence at HUMAN Security. Her technical specialty spans the fields of malware analysis and reverse engineering, with a keen interest in dissecting custom cryptographic systems. Outside of work, Lindsay writes articles on complex cybersecurity issues including data and trends analysis, technical pieces on reverse engineering and TTPs, and discussions on the business of the cybercriminal underground. Lindsay is an internationally-recognized cybersecurity speaker and author, and her first book, Reversing the Dark Web: Dissecting the Tools of the Underground Economy (No Starch Press) will be released in February 2026.
December 9, 2025 16:00-16:45