Category: Uncategorized

SECURE 2019 – Call for Speakers

Date of publication: 25/04/2019, misza

Call for Speakers for SECURE 2019 is now open. If you have an interesting topic and would like to share your ideas with a crowd of Polish and international IT security specialists, please consider submitting your proposal. You will find all applicable information below.

SECURE 2019 will be held on October 22-23, 2019 in Warsaw, Poland. This annual conference is dedicated entirely to IT security and addressed to administrators, security team members and practitioners in this field. SECURE’s unique feature is the organisers’ commitment to providing participants with reliable information about everything that is current and meaningful in IT security. A high professional level of the talks is ensured by CERT Polska during the paper selection process. Particular emphasis is on practical solutions, analysis of the current threats, latest trends in countering threats as well as important legal issues. Participants have an opportunity to gain the latest knowledge, improve their qualifications and exchange experience with experts.

Impersonating online payment service providers was the most popular attack scenario used for targeting e-banking users over the last year. The evolution of malware (increasingly affecting mobile devices and Internet of Things) still remains a challenge for IT security professionals. Another observed trend is usage of previously unknown 0-day vulnerabilities by APT groups. The VPNFilter case shows that advanced attacks can also affect an ordinary user. The question arises, how to take care of privacy and security in the face of above? We will try to find the answer to these and many more questions during SECURE 2019.

If you want to share your experience in these topics, or if you are an expert in one of the areas below, this Call for Speakers is for you.

SECURE 2019 will be held on October 22-23, 2019 in Warsaw, Poland. The conference topics will be roughly grouped in the following tracks:

    • technical – practical aspects of implementation and integration of security solutions
    • organisational – new trends in attacks, threats and their mitigation
    • legal

Presentation topics

We are looking for speakers willing to deliver a talk covering one or more of the following subjects:

    • malware evolution and analysis, including viruses, worms and botnets
    • network monitoring and intrusion detection
    •  innovatory honeypot and sandbox applications
    •  APTs
    •  security of SCADA/ICS
    •  security of smartphones and other mobile systems
    •  security events visualisation
    •  early warning against network threats
    •  incident handling
    •  standards for security incident data exchange
    •  DDoS attacks and their mitigation
    •  efficiency of methods for mitigation of new attack vectors
    •  open source security tools
    •  protection of online identity
    •  IoT security
    •  hardware security
    •  privacy, confidentiality and anonymity
    •  hardware security
    •  chain-supply security
    •  securing the human
    •  Polish and European law in regards to computer and information security
    •  law enforcement actions in regards to cybercrime mitigation
    •  research projects in the area of computer and information security

Important facts

    • proposals for presentations must be submitted only via EasyChair: https://easychair.org/conferences/?conf=secure2019
    • proposals should include at least a title, short abstract, name and bio of the speaker
    • any questions regarding the submission and selection process should be directed to [email protected]
    • time for presentation: 45 minutes, including Q&A
    • commercial presentations will not be accepted
    • all materials should be submitted in one of the following formats: OpenOffice, Microsoft Office, PDF
    • slides of presentations will be made available to all participants in an electronic version as well as video recordings where possible, unless strictly prohibited by the speaker
    • authors of accepted proposals will receive full conference package (workshops not inclusive), but they are responsible for their travel and accommodation

Important dates

    • proposals submission until: July 22, 2019
    • acceptance notice by: August 12, 2019
    • presentation submission by: October 14, 2019

Lightning talks

We encourage participants of SECURE to share their thoughts. One of the conference blocks will include lightning talks, allowing everyone to talk briefly about their projects, works, ideas or problems. Everything goes, as long as it touches IT security.

Important facts about lightning talks

    • maximum time for a talk is 5 minutes and total time for all talks will be limited
    • application for a lightning talk can be submitted at any time after you have registered for the conference or during the conference
    • the organisers reserve the right to accept or refuse any lightning talk application

Strengthening our malware analysis capabilities

Date of publication: 21/02/2019, piotrb

During last year we have collaborated with Hatching.io on improving the open source Cuckoo Sandbox. The main works were focused on porting advanced mechanisms for memory analysis which were developed internally by our team in the previous years. The public release of the onemon marks the last stage of this collaboration. We are proud that results of this work are now available to the security community.
Read more

Detricking TrickBot Loader

Date of publication: 05/02/2019, Michał Praszmo


    TrickBot (TrickLoader) is a modular financial malware that first surfaced in October in 20161. Almost immediately researchers have noticed similarities with a credential-stealer called Dyre. It is still believed that those two families might’ve been developed by the same actor.

    But in this article we will not focus on the core itself but rather the loader whose job is to decrypt the payload and execute it.
    Read more

    Recommendations on mitigation of man-in-the-middle phishing attacks (evilginx2/Modlishka)

    Date of publication: 31/01/2019, Michał Leszczyński

    CERT Polska has observed an interesting phishing technique used in attack against users of a popular Polish content aggregator. We have also noticed the emergence of a new tool called “Modlishka” whose purpose is to simplify and automate phishing attacks. In this article, we describe the way these highly-automated attacks work and present our recommendations for creators of websites for defending about them.Read more

    MWDB – our way to share information about malicious software

    Date of publication: 16/01/2019, CERT Polska

    Analysis of current threats is one of the most common challenges facing almost any organization dealing with cybersecurity. From year to year, it also becomes a harder nut to crack, being undoubtedly influenced by the growing scale of activities undertaken by criminals and the degree of their advancement. In the face of this situation, efficient exchange of information between researchers is a key issue.
    Read more

    Dissecting Smoke Loader

    Date of publication: 18/07/2018, Michał Praszmo

    Smoke Loader (also known as Dofoil) is a relatively small, modular bot that is mainly used to drop various malware families.

    Even though it’s designed to drop other malware, it has some pretty hefty malware-like capabilities on its own.

    Despite being quite old, it’s still going strong, recently being dropped from RigEK and MalSpam campaigns.

    In this article we’ll see how Smoke Loader unpacks itself and interacts with the C2 server.

     

    Read more

    Technical aspects of CTF contest organization

    Date of publication: 09/07/2018, Michał Leszczyński

    ctf


    CTF competitions often turn out to be a great amusement, but they also play a very important role in training of IT security specialists. Such kinds of challenges are challenging both to contestants and organizers. This article will describe organizational aspects related to such competitions, taking European Cyber Security Challenge 2018 qualifications as an example.

    Read more

    n6 released as open source

    Date of publication: 21/06/2018, pp

    We are happy to announce that another system developed by our team, n6 (Network Security Incident eXchange), has been released to the community on an open source licence.

    Read more

    Backswap malware analysis

    Date of publication: 19/06/2018, Hubert Barc

      Backswap is a banker, which we first observed around March 2018. It’s a variant of old, well-known malware TinBa (which stands for “tiny banker”). As the name suggests, it’s main characteristic is small size (very often in the 10-50kB range). In the summary, we present reasoning for assuming it’s the same malware.
      Read more

      Ostap malware analysis (Backswap dropper)

      Date of publication: 01/06/2018, Paweł Srokosz

        Malicious scripts, distributed via spam e-mails, have been getting more complex for some time. Usually, if you got an e-mail with .js attachment, you could safely assume it’s just a simple dropper, which is limited to downloading and executing malware. Unfortunately, there is a growing number of campaigns these days, where script doesn’t exit after downloading sample. Instead of ending its life – it remains active, waiting for additional commands or more samples to fetch. Some of the examples are: vjw0rm used in Vortex ransomware campaigns and Ostap – the main protagonist of our story.

        This article is an introduction to Backswap malware analysis, which is a second-stage malware downloaded by Ostap. Our analysis of Backswap malware will be published soon!

        Read more