Overview
Delve into the inner workings of a cybercriminal underground group through this 51-minute Black Hat conference talk. Explore the daily challenges, decision-making processes, and financial struggles of malicious actors trying to profit from illegal activities. Gain insights into the hierarchical structure of malware development within the Geost botnet operation and understand its impact on victim security. Analyze traffic patterns, control panel access, infrastructure, and fake applications used by the group. Examine victim profiles, phone data, and chat logs, including Russian slang. Investigate social dynamics, conversation patterns, and the roles of various actors within the criminal network. Learn about traffic buying, money exchangers, and other aspects of cybercriminal business operations. Presented by Sebastián GarcÃa, MarÃa José Erquiaga, and Anna Shirokova, this talk offers a unique perspective on the complexities of cybercrime ecosystems.
Syllabus
Introduction
Taggers
Botnet
Analyzing the Traffic
Access to the Control Panel
Infrastructure
Fake Applications
Victims
Phones
Chat Log
Slang
Russian slang
Social research
Puppeteer
PowerFire
Murex
Domains blocked
Conversation patterns
The third person
The second person
Conversations
disloyaltv
alcohol
money exchangers
final thoughts
year of the walk
questions
traffic buying
Taught by
Black Hat