Alexis Dorais-Joncas

Alexis Dorais-Joncas

Security Intelligence Team Lead


Education: M. Sc., Electrical Engineering

Highlights of your career? VP engineering @ tech startup Kryptiva Malware Researcher @ ESET Security Intelligence Team Lead @ ESET

Position and history at ESET? Joined ESET as a Malware Researcher in 2010 Co-started ESET Canada office in Montreal in 2011 Currently holding a Security Intelligence Team Lead position in Montreal.

What malware do you hate the most? Festi

Favorite activities? Camping and home improvement projects.

What is your golden rule for cyberspace? Use multiple layers of protection: A-V, hardened browsers & OS, etc.

When did you get your first computer and what kind was it? In 1996, my parents got the family a Pentium 1 @133 Mhz and 16 Mb RAM. 6 months later we even installed a 9600 modem to connect to the Internet.

Favorite computer game/activity? Freecell is awesome.


10 articles by Alexis Dorais-Joncas

ESET research

Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

ESET research

Jumping the air gap: 15 years of nation-state effort

ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs

Alexis Dorais-Joncas and Facundo Muñoz01 Dec 202111 min. read


Cybercrime

Trends 2018: Doing time for cybercrime

Trends 2018: Doing time for cybercrime

Cybercrime

Trends 2018: Doing time for cybercrime

Law enforcement and malware research join forces to take down cybercriminals

Alexis Dorais-Joncas12 Jul 20186 min. read


ESET research

Syndicasec in the sin bin: targeted espionage malware in action

Syndicasec in the sin bin: targeted espionage malware in action

ESET research

Syndicasec in the sin bin: targeted espionage malware in action

Technical analysis of Win32/Syndicasec.A, malware active in Nepal and China as far back as 2010, with a JavaScript payload registered in the Windows WMI subsystem and a system of fake blogs to discover its C&C servers, hosted on Tibet-related domains.

Alexis Dorais-Joncas23 May 201312 min. read


Win32/Kelihos botnet keeps on phishing, now exploiting Boston bombing

Win32/Kelihos botnet keeps on phishing, now exploiting Boston bombing

Win32/Kelihos botnet keeps on phishing, now exploiting Boston bombing

The botnet known as Win32/Kelihos keeps on infecting, now touting a YouTube video of the Boston Marathon bombing that comes with a malicious iframe pointing to a Redkit exploit page that infects viewers.

Alexis Dorais-Joncas17 Apr 20132 min. read


Malware evolving to defeat anti-DDoS services like CloudFlare?

Malware evolving to defeat anti-DDoS services like CloudFlare?

Malware evolving to defeat anti-DDoS services like CloudFlare?

Alexis Dorais-Joncas13 Feb 20134 min. read


Walking through Win32/Jabberbot.A instant messaging C&C

Walking through Win32/Jabberbot.A instant messaging C&C

Walking through Win32/Jabberbot.A instant messaging C&C

Malware authors have a solid track record in regards to creative Command and Control protocols. We've seen peer-to-peer protocols, some custom (Sality), some standard (Win32/Storm uses the eDonkey P2P protocol).

Alexis Dorais-Joncas30 Jan 20135 min. read


ESET research

Walking through Win32/Jabberbot.A

Walking through Win32/Jabberbot.A

ESET research

Walking through Win32/Jabberbot.A

Alexis Dorais-Joncas23 Jan 20135 min. read


OS X Lamadai: Flashback isn't the only Mac malware threat

OS X Lamadai: Flashback isn't the only Mac malware threat

OS X Lamadai: Flashback isn't the only Mac malware threat

Alexis Dorais-Joncas25 Apr 20124 min. read


OSX/Lamadai.A: The Mac Payload

OSX/Lamadai.A: The Mac Payload

OSX/Lamadai.A: The Mac Payload

Alexis Dorais-Joncas28 Mar 20124 min. read