BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//YMPB7L
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-YLWAQJ@pretalx.com
DTSTART;TZID=CET:20241025T090000
DTEND;TZID=CET:20241025T093000
DESCRIPTION:Infostealers are a type of malware designed to secretly collect
  sensitive information from infected devices. They create stealer logs wit
 h valuable data such as login credentials. These malware communicate with 
 Command-and-Control (C2) servers\, which direct their actions and receive 
 the stolen data. These stolen logs are highly valuable\, forming the basis
  of a profitable underground market where cybercriminals sell and trade th
 is information.\nBut what if C2 operators also fell victim to their own sk
 im : the biter bit. In this presentation\, we will dive into stealer logs 
 of C2 operators\, who have infected themselves accidentally with infosteal
 er malware\, to uncover hidden C2 infrastructure and their backstage. Join
  us as we expose the unexpected vulnerabilities within the cyber underworl
 d.
DTSTAMP:20260419T141003Z
LOCATION:Europe - Main Room
SUMMARY:The Ouroboros of Cybercrime: Witnessing Threat Actors go from Pwn t
 o Pwn'd - Estelle\, Stuart Beck
URL:https://pretalx.com/hack-lu-2024/talk/YLWAQJ/
END:VEVENT
END:VCALENDAR
