From the Source Badge

Learn Directly from the World’s Leading Digital Investigators

On October 20, 2025, The Volatility Foundation is once again hosting From The Source, a one-day summit, in Arlington, Virginia!

Registration is closed.

EVENT OVERVIEW

On Monday, October 20, 2025, The Volatility Foundation will once again host From The Source (FTSCon) – a one-day summit offering a unique opportunity to connect in-person with an international cadre of pioneering researchers and practitioners who work on the most advanced digital investigations. And this year, there are two follow-on training course offerings!

FTSCon will kick off with a Keynote Presentation followed by two parallel tracks:

The MAKER track is focused on the “makers” who build the open-source tools relied upon by modern digital investigators.
The HUNTER track highlights the “hunters” who have contributed to some of the most interesting investigations of the past year.

KEYNOTE SPEAKER

 

Joe Grand

Grand Idea Studio

Adventures in Wallet Hacking

 

With his team at offspec.io, Joe Grand has been hacking cryptocurrency wallets to help people recover funds they thought were lost forever. What started as a one-off project has evolved into a dizzying array of personalities and challenges.

In this keynote session, Joe will share stories and technical details of his wallet hacking adventures.

The Volatility Foundation Memory Forensics

NETWORK

Connect in person with pioneering researchers & practitioners who work on the most advanced digital investigations.

The Volatility Foundation Memory Forensics

LEARN

Hear from developers of your favorite open-source tools & the digital investigators who have discovered some of the biggest intrusions.

The Volatility Foundation Memory Forensics

TRAIN

Participate in one of two follow-on training course offerings: Malware & Memory Forensics with Volatility 3 and Joe Grand’s Hardware Hacking Basics.

TRACK SPEAKERS

The following speakers are confirmed; additional speakers to be announced.


Aleksandra Doniec

Malware Researcher, Open Source Developer

More details: hasherezade.net

Uncovering Malware's Secrets with TinyTracer

Malware analysts regularly face samples that are packed or heavily obfuscated. While sandboxing can provide a quick overview of behavior, it often falls short: evasions can defeat automated systems, and the results are noisy or miss the details we really care about: local functions, custom control flow, or subtle instruction-level tricks.

TinyTracer is an open-source dynamic binary instrumentation tool built on Intel Pin. Originally a small side project, it has grown into a powerful yet simple-to-use tracer designed for reverse engineers. It can follow API calls, local functions (with both inputs and outputs), and even single instructions with contextual changes. TinyTracer also includes built-in bypasses for many common anti-analysis techniques, and supports both Windows and Linux on Intel architectures.

This talk will demonstrate how TinyTracer fits into a reverse engineering workflow. Through short case studies, we’ll show how it can untangle strongly obfuscated malware and generate output ready for integration with disassemblers such as IDA or Binary Ninja.

If you’ve ever wanted a lightweight, configurable tracer to cut through obfuscation and get straight to the interesting parts of a binary, TinyTracer might be the tool you’ll reach for next.


Andrew Case

Director of Research | Volexity

Andrew Case is the Director of Research at Volexity, and has significant experience in incident response handling and malware analysis. He has conducted numerous large-scale investigations that span enterprises and industries. Case is a core developer of the Volatility memory analysis framework, and a co-author of the highly popular and technical forensics analysis book “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory.”

Detection and Analysis of Memory-Only Linux Rootkits

In late 2024, analysts from Stroz Friedberg published a short report on a Linux malware sample they discovered in the wild and named sedexp. Given the relative rarity of novel Linux malware, our team obtained a copy of sedexp and began a full analysis. This analysis led us to discover several significant components of the malware not covered in any public report to date, including loading of a memory-only rootkit, hooking of the network stack, and several interesting anti-forensics techniques. In this presentation, our team will detail how we analyzed this malware, including debugging the malicious application to extracting the memory-only rootkit to analyzing its components using Volatility 3 and IDA Pro. Attendees will learn a detailed methodology for detecting and analyzing memory-only Linux rootkits and see a showcase of Volatility 3’s capabilities.


Daniel Gordon

Cyber Threat Intelligence Analyst

Daniel Gordon, CySA+, CISSP, CEH, GCIA, GCTI, GCFA is a cyber threat intelligence analyst with a background in network defense, digital forensics, incident response, and IT support. He has degrees in Political Science as well as Modeling and Simulation. He has published blogs in Dark Reading, War on the Rocks, and Risky.biz and spoken at a large number of events including MTEM and SleuthCon.

When the AppleJeus GitHub is Worth the Squeeze: Citrine Sleet Investigation

Citrine Sleet is one of the most difficult North Korean hacking groups to track but in July 2025 we discovered and disrupted a Citrine Sleet campaign.

This talk will have a little bit of everything!  Collaboration between different DPRK hacking groups! Citrine Sleet using a DPRK IT worker to help backstop their social engineering! Activity across platforms including GitHub, NPM, PyPI, Twitter, and Discord! 

This talk will also give some background on notable DPRK hacking groups, show simple pivoting in GitHub, and give some recommendations to help protect your network from DPRK threat actors.


Denis Bueno 

Researcher | Sandia National Labs

Denis Bueno is a researcher at Sandia National Labs and the primary developer of CTADL. He is interested in large scale program analysis, especially where it intersects logic programming and databases. His website is https://denisbueno.net.

CTADL: Customizable Static Taint Analysis

CTADL is a static taint analyzer developed at Sandia National Labs. Many kinds of interesting software understanding questions can be understood as taint analysis questions; for instance: “how is potentially sensitive data processed by this malware? where is it sent?” CTADL was developed as a performant and flexible way of answering these types of questions. It was designed so that users can modify the analysis, for example by augmenting it with other static analyses. CTADL’s architecture is compositional and summary-based, enabling efficient parallel execution. It reasons about fields using access paths and builds a call graph in the same fixpoint flow as the main analysis, enabling data flow analysis to increase call graph precision and vice versa. The talk will go over the problem of taint analysis, the reasons why CTADL was developed as a solution, the internals of the CTADL architecture, and some applications. CTADL is open source and available online at https://github.com/sandialabs/ctadl.


Joe FitzPatrick

Trainer and Researcher | SecuringHardware.com

Joe FitzPatrick (@securelyfitz) is an Instructor and Researcher at SecuringHardware.com. Joe has spent most of his career working on low-level silicon debug, security validation, and penetration testing of CPUs, SoCs, and microcontrollers. He has spent the past decade developing and delivering hardware security related tools and training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks training, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Rethinking DMA Attacks with Erebus

Despite broader use of IOMMUs and other mitigation, DMA attacks are still alive and kicking. Open-source DMA attack tools are readily available, relatively inexpensive, and increasingly versatile. In addition to forensic analysis, they’ve found wide use in game cheating communities and a some minor adoption in system reverse engineering.

Epic Erebus is a new tool many years in the making designed for both analysis as well as attacks. The combination of a minimal form factor, open tool chain, and open implementation allow it to be a simple memory capture device that’s easily reconfigurable for analyzing new target systems, stress testing the implementation of various DMA mitigations, and prototyping fully embedded attacks.

Hopefully you’ll leave this session with new ideas of where too look for, how to use, and how to protect against PCIe DMA accesses.


Joseph Edwards

Security Engineer | 7AI

Joseph is a malware reverse engineer and incident responder with experience on multiple operating systems and platforms. Prior to his current role at 7AI, he worked for SentinelOne’s DFIR team to investigate intrusions and analyze malware in customer environments. He also worked as a Senior Malware Researcher at ReversingLabs, where he published blogs on unique and emerging file-based threats. He holds several certifications from SANS for Malware Reverse Engineering and Digital Forensics, and is currently pursuing a Master’s in Information Security Engineering at the SANS Technology Institute.

The Forensics of Zoom's Remote Control

Initial access threat actors and social engineers have long used videoconferencing software to convince victims to hand over remote control of their device. This type of access results in hands-on-keyboard activity by threat actors, leading to credential compromise and potentially infostealers. Zoom is one of the latest enterprise software offerings to be abused for remote access by attackers, namely a group reported as ELUSIVE COMET.

From a digital forensics perspective, how does remote access work through these applications? What information is recorded in more and less volatile sources? This research provides a methodology for profiling applications and their forensic impact (without getting into legal trouble as a reverse engineer).


Juan Andrés Guerrero-Saade

Executive Director for Intelligence | SentinelOne

Juan Andrés Guerrero-Saade (better known as ‘JAGS’) is Executive Director for Intelligence and Security Research at SentinelOne and Distinguished Resident Fellow for Threat Intelligence and Adj. Professor at the Johns Hopkins SAIS Alperovitch Institute for Cybersecurity Studies. He was Google Chronicle’s Research Tsar, co-founder of Stairwell, and a Principal Security Researcher at GReAT focusing on targeted attacks. Prior to that, JAGS worked as Senior Cybersecurity and National Security Advisor to the Government of Ecuador. His joint work on Moonlight Maze is now featured in the International Spy Museum’s permanent exhibit in Washington, DC. JAGS is the Founder of LABScon and co-hosts the Three Buddy Problem podcast.

From Threat Hunting to Threat Gathering

Presentation details will be revealed at FTSCon.


Michael Carson

Senior Member of Technical Staff | Sandia National Labs

Michael Carson has been working in scalable malware analysis space since 2016 at Sandia. He is the creator of Thorium and a fan of the Rust programming language.

Thorium

Thorium is a highly scalable, distributed malware analysis and data generation framework that has recently been open sourced (https://github.com/cisagov/thorium). Thorium is designed to make cyber incident response, triage, and file analysis easier through the safe ingestion and storage of data, automation of analyses and easy access results, files, tags, and repositories. It allows for analysts and developers to easily test, deploy, and share tools in a variety of formats including docker, VMs, and bare-metal. During this talk we will explain why we built Thorium, what it does, how it compares to other platforms, and how you can integrate it into your workflows.


Michael Horka

Lumen Technologies | Black Lotus Labs

Michael Horka is a Principal Information Security Engineer at Black Lotus Labs, the threat research division of Lumen Technologies. He is responsible for covert network, botnet and advanced actor tracking and intelligence. He has over a decade of experience performing threat analysis and reporting on nation-state campaigns, most notably as a Special Agent with the FBI’s Houston Field Office.

Lilac Typhoon aboard the Indigo Train - The Current State of Chinese Obfuscation Networks

For more than four years, Black Lotus Labs, the threat intelligence division of Lumen Technologies, has monitored Chinese state-sponsored threat actor Lilac Typhoon’s intrusion operations against U.S. and Taiwan government, military, critical infrastructure, and communications sectors through an evolving covert network of compromised SOHO and IOT devices. Historically, Lilac Typhoon conducted their intrusion operations, including 0-day exploitation, through an array of compromised modems and routers we dubbed “Silverfox.” Jumping forward to present day, Silverfox has evolved into what we now call “Indigo Train”: a series of “malwareless,” elusive, geographically distributed, and chained operational nodes, consisting of hijacked SOHO and IOT devices. The structure of this chaining methodology mirrors what we have observed from an associated threat actor, indicating a likely shift to enhance operational security over the past few years by Chinese state-sponsored threat actors.


Tom Lancaster & Josh Duke

Threat Intelligence | Volexity

Tom Lancaster is the Director of Threat Intelligence at Volexity, where he applies more than 10 years of threat intelligence, malware detection and incident response experience. He is a specialist in both investigating and tracking nation-state threat actors, as well as finding new ones.

Josh Duke is a Threat Intelligence Analyst at Volexity with experience in tracking nation-state threat actors and infrastructure analysis, transforming findings from these investigations into defenses for customer networks. With a strong understanding of Computer Science, holding both a MS and BS in the field, Josh is able to connect his understanding of software and networking to inform his work as an intelligence analyst.

Mission Auth Possible: Passwordless Phishing

This presentation will discuss various state-sponsored threat actors, including Russian, Iranian, and Chinese threat actors, who have abused Microsoft’s Device Code and OAuth Code authentication workflows to phish users in order to gain access to their Microsoft 365 accounts. This access was then used to download emails, send additional phishing emails from compromised accounts, and download files. The particular phishing techniques used were passwordless; users never entered their password on an attacker-owned website, but attackers were allowed to obtain a token that authenticated them to the victim’s account for arbitrary access at a later time. This presentation will cover details of how these attacks were carried out, the post-exploitation activities conducted by the threat actors, and detection opportunities for network defenders.


Toni de la Fuente

Creator of Prowler, Founder & CEO

Toni de la Fuente is the creator of Prowler, the most widely used open-source multi-cloud security tool, and the founder and CEO of Prowler. With a background as a Senior Security Engineer and Senior Security Consultant at AWS, Toni has dedicated his career to building practical, scalable security solutions that help organizations secure their cloud environments with transparency and efficiency. He is deeply passionate about Free Libre Open-Source Software (FLOSS) and is a leading advocate for open cloud security, democratizing access to security tools, and fostering a global community around security, incident response, and digital forensics.

Open Cloud Security, Lessons Learned Building Prowler

Cloud security is a moving target, ephemeral resources, providers release new services daily, attackers evolve constantly, and compliance demands grow more complex. In this talk, we’ll explore key lessons learned from developing Prowler, an open-source cloud security scanning tool used across industries and cloud platforms. From architectural trade-offs to automation pitfalls, community-driven features, and hard-earned insights on multi-cloud security, this session distills years of experience into actionable takeaways for engineers, security teams, and open-source contributors.


Wesley Shields

Security Engineer | Google

Wesley Shields works at Google where he may or may not be a robot, but does spend most of his time working on understanding and disrupting Russian threat groups.

COLDRIVER: NOROBOT / YESROBOT / MAYBEROBOT

COLDRIVER is traditionally known for phishing and hack-and-leak campaigns against Western NGOs, NATO and governments, but they have also been known to use malware in highly targeted circumstances. This talk is an overview of their latest chain of malware and how it has evolved in 2025.

Agenda

8:00 – 9:00 AM | Breakfast
9:00 – 12:30 | Talks
12:30 – 1:30 | Lunch
1:30 – 5:00 | Talks
6:00 – 9:00 PM | Evening Reception [Offsite]

The #FTSCon Evening Reception will be held at VUE Rooftop DC.

This event is sponsored by Volexity.

FOLLOW-ON TRAINING COURSE OFFERINGS

Directly following From The Source, there will be two in-person training course offerings. Students who register for these training courses will also receive a complimentary pass to From The Source.

Malware and Memory Forensics Training with Volatility 3

This four-day training course is your opportunity to learn directly from the core developers about new capabilities in Volatility 3 and what motivated recent design changes.

Joe Grand's Hardware Hacking Basics

This two-day course teaches fundamental hardware hacking concepts and techniques used to reverse engineer and defeat the security of electronic systems. No prior hardware experience is required.

LOCATION

Event Venue

 

Convene

1201 Wilson Blvd

Arlington, Virginia

GIVING BACK

Charitable Giving

100% of the proceeds for From The Source will be donated to Connect Our Kids, a 501(c)(3) nonprofit that is pioneering technology to find families, build connections, and create community for children in the foster care system.

Get Involved!

Learn how you can help keep Volatility free and available to all!

Volatility Foundation logo

Want to Join the Community?