Vitali Kremez (@VK_Intel)
Vitali Kremez @VK_Intel:
Vitali Kremez is a well-known ethical hacker. His cybercrime and nation-state research and discoveries led to his direct name appearing in the malware linked to the Russian nation-state group known as "APT28," which is believed to be the military operation led by the Russian GRU after his blog revealed one particular group of malware. Moreover, his name often appears in various malware families from Maze to Medusa ransomware as cybercrime tribute to him by the criminal actors who closely watch and acknowledge his research.
He is a former US cybercrime government analyst responsible for tracking and hunting for the most number of the Eastern European cyber criminals arrested abroad with his notable public case related to the StubHub intrusion. In this case, Vitali identified and tracked the Russian cybercriminal in Spain and helped extradite him to the US.
Daniel Bunce (@0verfl0w_)
Daniel Bunce is a Security Researcher who specializes in Malware Reverse-Engineering. Initially starting off in the field interested in Offensive Security tactics, he used that knowledge to transition over to Reverse Engineering and Malware Analysis, where he now spends most of his time looking at Windows based E-Crime malware and working on tools for automating analysis, such as to unpack samples, extract configurations, and emulate communications.
Jason Reaves (@sysopfb)
Jason Reaves is a Threat Researcher who specializes in malware reverse-engineering within the Crimeware space. He has spent the majority of his career tracking threats in the Crimeware space, including reverse-engineering data structures and algorithms found in malware in order to create automated frameworks for harvesting configuration and botnet data. Previously, he worked as a software developer and unix administrator in the financial industry and also spent six years in the U.S. Army. Jason holds multiple certifications related to reverse-engineering, application exploitation and has published numerous papers on topics such as writing malware scripts pretending to be a bot, unpackers, configuration data harvesters and covert channel utilities.