Man in the Malware: Intercepting Adversarial Communications

Ben Folland

DEF CON 33 · Day 2 · Main Stage

Ben Folland's DEF CON 33 talk presents a threat intelligence methodology for intercepting malware communications—specifically, the C2 (command and control) channels and data exfiltration pipelines of

AI review

Ben Folland documents how hardcoded Telegram bot tokens in commodity info-stealer malware give defenders the same API access as the attacker — enabling victim enumeration, actor attribution, data recovery, and active disruption of the exfiltration pipeline.

Watch on YouTube