Security Unlocked

Untangling Botnets


Listen Later

You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about the "future of bitcoin" and coin mining kicks the door open, and he's ready to spread some holiday knowledge. Oh yeah, he's also going to cut you in on a sweet deal he has going on with his buddy Carl, who he met at dollar wing night. Unfortunately, Carl is one of the bad guys. He is secretly infecting multiple devices with botnets, collecting crypto-cash at the expense of the naive device owners who don't know that their machines are being used.   

In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are re-joined by Microsoft Defender 365 threat intelligence team member Elif Kaya, whose current primary focus is with botnets, commodity threats, and phishing delivered malware. Elif explains some of the new techniques from botnets, how they're being used for financial theft via cryptocurrency mining, and the impact on the defender's view of these actions.  


In This Episode You Will Learn:  

  • An overview and detailed description of what botnets are 
  • The fundamentals of cryptocurrency mining & botnets on a machine
  • Best practices when trying to identify new botnets


Some Questions We Ask:    

  • How can Microsoft contribute to helping take down these botnets?  
  • What direction are the new botnets moving towards? 
  • How common is competition-killing activity within new botnets and crypto mining? 


Resources: 

Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment 

When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure 

When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks 

View Elif Kaya on LinkedIn

View Natalia on LinkedIn 

View Nic on LinkedIn 

 

Related:   

Listen to: Security Unlocked: CISO Series with Bret Arsenault 

Listen to: Afternoon Cyber Tea with Ann Johnson

Discover and follow other Microsoft podcasts at microsoft.com/podcasts


Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. 

Hosted on Acast. See acast.com/privacy for more information.

...more
View all episodesView all episodes
Download on the App Store

Security UnlockedBy Microsoft

  • 4
  • 4
  • 4
  • 4
  • 4

4

56 ratings


More shows like Security Unlocked

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,986 Listeners

Risky Business by Patrick Gray

Risky Business

364 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

639 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

370 Listeners

Hacked by Hacked

Hacked

183 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,018 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Click Here by Recorded Future News

Click Here

406 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,951 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

172 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

316 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

77 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

129 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

43 Listeners