Alexis Dorais-Joncas

Alexis Dorais-Joncas

Security Intelligence Team Lead

Education: M. Sc., Electrical Engineering

Highlights of your career? VP engineering @ tech startup Kryptiva
Malware Researcher @ ESET
Security Intelligence Team Lead @ ESET

Position and history at ESET? Joined ESET as a Malware Researcher in 2010
Co-started ESET Canada office in Montreal in 2011
Currently holding a Security Intelligence Team Lead position in Montreal.

What malware do you hate the most? Festi

Favorite activities? Camping and home improvement projects.

What is your golden rule for cyberspace? Use multiple layers of protection: A-V, hardened browsers & OS, etc.

When did you get your first computer and what kind was it? In 1996, my parents got the family a Pentium 1 @133 Mhz and 16 Mb RAM. 6 months later we even installed a 9600 modem to connect to the Internet.

Favorite computer game/activity? Freecell is awesome.

Articles by author

Walking through Win32/Jabberbot.A

Malware authors have a solid track record in regards to creative Command and Control protocols. We’ve seen peer-to-peer protocols, some custom (Sality), some standard (Win32/Storm uses the eDonkey P2P protocol). We’ve seen binary protocols (Win32/Peerfrag, aka Palevo). We’ve seen other custom protocols that leverage other standard protocols such as HTTP (Win32/Georbot), DNS (Morto)and IRC (Win32/AutoRun.IRCBot.AK),

OSX/Lamadai.A: The Mac Payload

Earlier this month, researchers from AlienVault and Intego reported a new malware attack targeting Tibetan NGOs (Non-Governmental Organizations). The attack consisted of luring the victim into visiting a malicious website, which then would drop a malicious payload on the target’s computer using Java vulnerability CVE-2011-3544 and execute it. The webserver would serve a platform-specific JAR