NorthSec 2024

Malware Q&A
05-16, 15:15–15:45 (US/Eastern), Ville-Marie

Q&A Discussion for the malware block.


What is the language of your talk/workshop?

English

Alexandre is a malware researcher at ESET since 2021. Working with the Montreal team, his research is focused on tracking APT groups and their toolsets.

He has previously presented about APTs and attribution at Botconf, Sleuthcon, Hackfest, and BSidesMTL. He is also involved in mentoring students getting started in infosec.
His interests include operating systems fundamentals, writing shell scripts to automate tasks that don't always need to be automated, and brewing beer.

This speaker also appears in:

Marc-Etienne is a malware researcher at ESET since 2012. He specializes in
malware attacking unusual platforms, whether it’s fruity hardware or software
from south pole birds. Marc-Etienne focused his research on the reverse
engineering of server-side malware to discover their inner working and
operation strategy. His research led to the publication of the Operation
Windigo white paper that won Virus Bulletin’s Péter Szőr Award for best
research paper in 2014. He
presented at multiple conferences including RSAC, FIRST, 44con, CARO and
Linuxcon Europe. When he’s not one of the organizer, he loves participating in
CTF competitions like a partying gentleman. Outside the cyberspace,
Marc-Etienne plays the clarinet and read comics.

Marc-Etienne est chercheur en logiciels malveillants chez ESET depuis 2012. Il
se spécialise dans les logiciels qui ciblent les plateformes inhabituelles,
comme les ordinateurs avec des pommes ou des pingouins. Durant les dernières
années, Marc-Etienne s'est concentré sur la rétro-ingénierie de logiciels
malveillants s'attaquant aux serveurs, à la fois pour comprendre leurs
fonctionnements et comment ils sont utilisés. Ses recherches ont mené à la
publication du rapport Operation Windigo qui s'est mérité le prix Péter Szőr
Award à Virus Bulletin pour meilleur rapport de recherche en 2014. Il a présenté à de multiples conférences incluant RSAC, FIRST, 44con, CARO Workshop et Linuxcon Europe. Quand il n'est pas dans le comité
organisateur, il aime participer à des compétitions de sécurité (CTF) comme un
gentilhomme en fête. En dehors du cyberespace,
Marc-Etienne joue de la clarinette et lit des bandes dessineés.

This speaker also appears in:

Alexis Dorais-Joncas is the Senior Manager of Proofpoint’s APT research team, where he and his team of threat researchers and intelligence analysts focus on tracking the most elusive state-sponsored threat actors and ensuring Proofpoint customers are protected against these persistent attackers.
Prior to joining Proofpoint, Alexis led ESET’s Montreal-based R&D branch office for over 10 years, where his team focused on malware research, network security and targeted attacks tracking. Alexis is an established speaker on current cyberthreats, having spoken in front of diverse audiences at events such as Northsec, Bluehat, Botconf, First CTI, Sector and Rightscon. He has also been quoted in several security and technical media such as Wired, ITWorldCanada and Ars Technica, with broadcast appearances on Radio-Canada and Skynews.
Alexis holds an M. Sc. in Electrical Engineering from the University of Sherbrooke in Canada.

This speaker also appears in:

Sergei is a co-founder of OpenAnalysis Inc, and part of the team behind UnpacMe. When he is not reverse engineering malware Sergei is focused on building automation tools for malware analysis, and producing tutorials for the OALABS YouTube channel. With over a decade in the security industry Sergei has extensive experience working at the intersection of incident response and threat intelligence.

This speaker also appears in:

Greg Lesnewich is a Senior Threat Researcher at Proofpoint, focused on identifying, tracking, detecting, and disrupting malicious activity linked to North Korea and Russia. Greg has a background in threat intelligence, incident response, and managed detection, previously working at Recorded Future, Leidos, and NCFTA, with experience in developing methods of tracking espionage and state-sponsored activity. Greg enjoys the topics of weird forensic artifacts, measuring malware similarity, YARA, and infrastructure tracking.

This speaker also appears in: