Miguel HernándezAlessandra Rizzo

Fortifying DevOps: Understanding and Fighting Botnet Threats by Miguel Hernández and Alessandra Rizzo

In the rapidly evolving landscape of cybersecurity, botnets remain a significant threat to Kubernetes and containerization environments. In this talk, we will present a comprehensive overview of our latest research on new groups, delving into their organizational structures, codebases, and tactics. We will explore how these malicious actors share information, select their targets, and offer their services.

By sharing our findings, we hope to raise awareness and facilitate a better understanding of these threats, ultimately contributing to the development of more effective countermeasures.

Botnets represent a significant and evolving threat in the cybersecurity landscape. This presentation aims to shed light on the inner workings of these networks based on extensive research and real-world examples. Attendees will gain insights into:

- Organization and Structure: Understanding how modern botnets are set up and managed.

- Code Analysis: A deep dive into the types of code used by botnet operators to exploit container vulnerabilities.

- Information Sharing: Exploring whether and how these networks share data amongst themselves.

- Target Selection: Analyzing the methods and criteria used by botnets to choose and attack applications.

Our aim is to provide a global view of the current state of botnets, offering valuable knowledge that can aid in the detection, analysis, and mitigation of these threats. This talk is designed for security professionals, researchers, and anyone interested in understanding the complexities and dangers posed by botnets in today’s digital world.

Talk Questions

      
  • Question 740
    How we can identify if our devices are infected on the botnet, do we have some way to clean it or just formatting
  • Question 737
    Are you aware of attacks that aim ML/AI models ?
  • Question 736
    Can mirai work in the background without alerting that exist and if it does, how is the user supposed to see that if the user is without knowledge in cybersecurity?
  • Question 738
    Are any of yhese malwares working in the background without alerting the user and how is the user supposed to acknowledge this?
  • Question 739
    How do malware affect and attack the gamers beside piracy?
  • Question 741
    how to detect malicious bots from good ones?
  • Question 742
    Antivirus is useful for these cases?