Publications and Presentations

Stephen's Google Scholar Page
Stephen Hilt's Work
Publication Date Publication Name Type Link
2023-05-30 Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals Blog Void Rabisu
2023-05-23 Future Exploitation Vector: File Extensions as Top-Level Domains Blog File Extensions TLD
2023-02-02 What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits Blog Water Dybbuk
2022-12-15 The Near and Far Future of Ransomware Business Models Paper Ransomware Business Models
2022-11-08 DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework Blog DeimosC2
2022-06-06 Closing the Door: DeadBolt Ransomware Locks Out Vendors With Multitiered Extortion Scheme Blog Closing The Door
2022-04-26 How Cybercriminals Abuse Cloud Tunneling Services Blog/Paper Cloud Tunneling
2022-03-29 A Floating Battleground Navigating the Landscape of Cloud-Based Cryptocurrency Mining Paper A Floating Battleground
2022-03-17 Cyclops Blink Sets Sights on Asus Routers Blog Cyclops Blink
2022-01-20 Backing Your Backup: Defending NAS Devices Against Evolving Threats Paper NAS Attacks
2021-06-08 Modern Ransomware's Double Extortion Tactics and How to Protect Enterprises Against Them Paper Double Extortion Ransomware
2021-03-11 The Future of P2P IoT Botnets Blog The Future of P2P IoT Botnets
2021-01-19 VPNFilter Two Years Later: Routers Still Compromised Blog VPFilter Two Years Later
2020-12-22 How to Protect Your Kid's Privcay While At-Home Learning Blog Kid's Privacy
2020-09-16
Tribe Of Hackers Blue Team Edition
Book
Tribe Of Hackers Blue Team Edition
2020-07-15
Worm War: The Botnet Battle for IoT Territory Paper Worm War
2020-01-20 Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats Paper Fake Company, Real Threats
2019-09-10 The Internet of Things in the Cybercrime Underground Paper IoT In the Cyber Crime Underground
2019-08-30 Tribe Of Hackers Red Team Edition Book Tribe Of Hackers Red Team Edition
2019-03-07 Cultivating Security in the Food Production Industry: Nipping IoT Risks and Threats in the Bud Paper Security in the Food Production Industry
2019-03-06 Cybersecurity Risks in Complex IoT Environments: Threats to Smart Homes, Buildings and Other Structures Paper Cybersecurity Risks in Complex IoT Environments
2019-01-16 A Security Analysis of Radio Remote Controllers for Industrial Applications Paper Industrial Radios
2018-10-30 Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries Paper Exposed and Vulnerable Critical Infrastructure
2017-12-30
The Sound of a Targeted Attack Paper
The Sound of a Targeted Attack
2017-06-06
How Cybercriminals Can Abuse Chat Platform APIs as C&C Infrastructures
Paper
Chat Platform API's as C&C
2017-05-30
Securing Smart Cities: Moving Toward Utopia with Security in Mind Paper
Securing Smart Cities
2017-02-15
US Cities Exposed
Paper
US Cities Exposed
2016-12-13
Leaking Beeps: IT Systems Broadcasting Sensitive Info
Paper
Leaking Beeps (IT)
2016-11-30
HDDCryptor: Subtle Updates, Still a Credible Threat Blog
HDDCryptor: Subtle Updates
2016-11-09
Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched
Blog
PawnStorm Ramps Up Spear-Phishing
2016-10-25
Leaking Beeps: Unencrypted Pager Messages in Industrial Environments
Paper
Leaking Beeps (ICS)
2016-09-29
The Rise and Fall of Encryptor RaaS
Blog
Rise and Fall of Encryptor RaaS
2016-09-20
Fox-info
PCWorx-info
Code
fox-info.nse
pcworx-info.nse
2016-09-26
Leaking Beeps: Unencrypted Pager Messages in the Healthcare Industry
Paper
Leaking Beeps (Health Care)
2016-09-15
BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs
Blog
HDDCryptor
2016-08-28
Hacking Exposed Industrial Control Systems
Book
Hacking Exposed ICS
2015-12-07
North American Underground: The Glass Tank
Paper
North American Underground
2015-11-11
GasPot Integrated Into Conpot, Contributing to Open Source ICS Research
Blog
Gaspot/Conpot
2015-08-05
The Gaspot Experiment
Paper
The Gaspot Experiment
2015-06-03
bacnet-info
enip-info
omron-info
s7-info
Code
bacnet-info.nse
enip-info.nse
omron-info.nse
s7-info.nse
2014-10-01
Threat Intelligence firm mistakes research for nation-state attack Blog
APT Chattanooga
2014-03-26
Redpoint: Discover & Enumerate BACnet Devices
Blog
Redpoint: Bacnet
2014-2-03
PlcPwn
Blog
PlcPwn
Stephen Hilt Speaking
Conference Date Conference Name Presentation Name Link
2020-05
BSidesKnoxville

How we reverse-engineered multiple industrial radio remote-control systems


https://www.youtube.com/watch?v=xBXktWwvEyI
2020-01
S4x20
Factory Honeynet: Highly Realistic and Interactive https://www.youtube.com/watch?v=p84HJveHQdg
2019-10
CS3STHLM
How we reverse-engineered multiple industrial radio
https://www.youtube.com/watch?v=5l_cWD5ZR-M
2019-03
RSA
Secure the Pod Bay Doors, HAL: Cybersecurity Risks of IoT Automation
https://www.youtube.com/watch?reload=9&v=6vFYLJstCq0
2019-01
S4x19
The Industrial Radio Project - Hacking Cranes Using SDR
https://www.youtube.com/watch?v=1wBdD-KZ4rI
2019-01
S4x19
ICS Honeypots - How To Use Them (Panel) https://www.youtube.com/watch?v=pxP_D1oVYkg
2019-11
SecureWorld
SecureWorld: Behind the Scenes
https://www.youtube.com/watch?v=tqKfau4ZLmk
2018-08
DEFCON 26 (IOT VILLAGE)
The Sound of a Targeted Attack
https://www.youtube.com/watch?reload=9&v=zzgmWlCfCRU
2018-05
BSidesKnoxville
The differences and niches in the different major criminal undergrounds
https://youtu.be/hhniUz5xG24?t=2564
2018-04
HITB2018AMS
Attacking IoT Speakers
https://www.youtube.com/watch?v=za6F0pfisek
2017-09
Derbycon 7.0
Victim Machine has joined #general: Using Third Party APIs as C&C Infrastructure.
https://www.irongeek.com/i.php?page=videos/derbycon7/t115-victim-machine-has-joined-general-using-third-party-apis-as-cc-infrastructure-stephen-hilt-lord-alfred-remorin
2016-09
Derbycon 6.0
The 90's called, they want their technology back http://www.irongeek.com/i.php?page=videos/derbycon6/316-the-90s-called-they-want-their-technology-back-stephen-hilt
2015-10
4SICS (CS3STHLM)
The little pump gauge that could
https://www.youtube.com/watch?v=m3utW3cj5ls
2015-08
Black Hat 2015
The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems
https://www.youtube.com/watch?v=gorNee0MaoU
2015-??
Hack3rCon 5
I Am Nation State (And So Can You!) http://www.irongeek.com/i.php?page=videos/hack3rcon5/h13-i-am-nation-state-and-so-can-you-tothehilt-synackpwn
2014-09 Derbycon 4.0
Protocol Me Maybe?: How to Date SCADA
http://www.irongeek.com/i.php?page=videos/derbycon4/t124-protocol-me-maybe-how-to-date-scada-stephen-hilt
2014-01
S4x14
PLCPwn
<links needed>