VB Blog

WordPress users urged to manually update to fix bug that prevents automatic updating

Posted by   Martijn Grooten on   Feb 8, 2018

Users of the popular WordPress content management system are urged to manually update their installation to version 4.9.4, as a bug in the previous version broke the ability to automatically install updates.

Read more  

New paper: A review of the evolution of Andromeda over the years

Posted by   Martijn Grooten on   Feb 7, 2018

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by Fortinet researchers Bahare Sabouri and He Xu, we look back at the evolution of Andromeda from version 2.06 to 2.10 and demonstrate both how it improved its loader to evade automatic analysis/detection and how the payload varied among the different versions.

Read more  

There is no evidence in-the-wild malware is using Meltdown or Spectre

Posted by   Martijn Grooten on   Feb 2, 2018

Reports of malware using the Meltdown or Spectre attacks are likely based on proof-of-concept code rather than files written for a malicious purpose.

Read more  

Throwback Thursday: Malware taking a bit(coin) more than we bargained for

Posted by   Martijn Grooten on   Feb 1, 2018

This Throwback Thursday, we republish the VB2012 paper by Microsoft researcher Amir Fouda, one of the earliest papers to look at malware targeting Bitcoin.

Read more  

First time speaker? Don't be afraid of submitting to the VB2018 CFP

Posted by   Martijn Grooten on   Jan 31, 2018

We especially encourage those less experienced in speaking in public to submit to the call for papers for VB2018, where we aim to provide a friendly and welcoming environment in which people can both present their own research and learn from what others have been working on.

Read more  

VB2017 paper: VirusTotal tips, tricks and myths

Posted by   Martijn Grooten on   Jan 25, 2018

At VB2017 in Madrid, security researcher Randy Abrams presented an overview of the VirusTotal service and then went on to bust several of the persistent myths that surround it. Today we publish both Randy's paper and the recording of his presentation.

Read more  

Healthcare CERTs highlight the need for security guidance for specific sectors

Posted by   Martijn Grooten on   Jan 24, 2018

A new computer emergency response team has been launched in the Netherlands to provide guidance specifically tailored to the healthcare sector. Martijn Grooten welcomes the development.

Read more  

VB2018 call for papers now open!

Posted by   Martijn Grooten on   Jan 23, 2018

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2018 is now open and we want to hear from you!

Read more  

Book review: Serious Cryptography

Posted by   Martijn Grooten on   Jan 22, 2018

VB Editor Martijn Grooten recommends Jean-Philippe Aumasson's 'Serious Cryptography' as a very solid but practically focused introduction to cryptography.

Read more  

Necurs pump-and-dump spam campaign pushes obscure cryptocurrency

Posted by   Martijn Grooten on   Jan 16, 2018

A Necurs pump-and-dump spam campaign pushing the lesser known Swisscoin botnet is mostly background noise for the Internet.

Read more  

Search blog

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/04/april-issue-vb-published/

Microsoft Word for Mac exploit used in targeted attacks

Tibetan NGOs targeted.
Tibetan NGOs targeted. Researchers at Alienvault have discovered a targeted attack against Tibetan NGOs that uses a three-year-old vulnerability in Microsoft Office for Mac.… https://www.virusbulletin.com/blog/2012/03/microsoft-word-mac-exploit-used-targeted-attacks/

AV-Test issues latest results summary

Bi-monthly stats released for 31 consumer and business products.
Bi-monthly stats released for 31 consumer and business products. Independent testing body Av-Test.org has published its latest round of results, covering some 23 consumer products… https://www.virusbulletin.com/blog/2012/03/av-test-issues-latest-results-summary/

Spam catch rates drop in latest VBSpam test

Catch rates significantly lower than in previous months.
Catch rates significantly lower than in previous months. In the latest VBSpam comparative test, 20 solutions achieved a VBSpam award, but the majority displayed significantly lower… https://www.virusbulletin.com/blog/2012/03/spam-catch-rates-drop-latest-vbspam-test/

March issue of VB published

The March issue of Virus Bulletin is now available for subscribers to download.
The March issue of Virus Bulletin is now available for subscribers to download. The March 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/03/march-issue-vb-published/

March

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/03/

'Unsubscribe' URL in junk fax leads to malware

Trojan downloader behind .co.cc URL.
Trojan downloader behind .co.cc URL. Researchers at Vircom have discovered a junk fax with an 'unsubscribe' URL which contained a trojan downloader. Junk faxes (also known as 'fax… https://www.virusbulletin.com/blog/2012/02/unsubscribe-url-junk-fax-leads-malware/

New Zeus/SpyEye botnet does away with command-and-control servers

Increasing use of UDP to avoid communication tracking.
Increasing use of UDP to avoid communication tracking. Researchers at Symantec have discovered a new parallel build of Zeus (also known as Zbot) and SpyEye that appears to be… https://www.virusbulletin.com/blog/2012/02/new-zeus-spyeye-botnet-does-away-command-and-control-servers/

200-fold increase in HTML-attachment spam

Cutwail botnet likely behind campaign that sends users to Phoenix exploit kit.
Cutwail botnet likely behind campaign that sends users to Phoenix exploit kit. Researchers at M86 have reported a significant increase in the amount of spam sent with malicious… https://www.virusbulletin.com/blog/2012/02/200-fold-increase-html-attachment-spam/

'Hotmail and Gmail have best spam filter' says Cascade spam test

Comparative test did not take false positives into account.
Comparative test did not take false positives into account. Researchers from Cascade Insights performed a comparative spam filtering test on the three major webmail providers and… https://www.virusbulletin.com/blog/2012/02/hotmail-and-gmail-have-best-spam-filter-says-cascade-spam-test/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
The February issue of Virus Bulletin is now available for subscribers to download. The February 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/02/february-issue-vb-published/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/02/

Hacktivists hijack DNS of popular websites

Security at registrars may be weak link.
Security at registrars may be weak link. A hacktivist group has managed to redirect the traffic of two popular websites by hijacking their DNS settings, researchers at Internet… https://www.virusbulletin.com/blog/2012/01/hacktivists-hijack-dns-popular-websites/

New RFC describes best practices for running DNS-based lists

DNSBL users advised to avoid those lists that charge for delisting.
DNSBL users advised to avoid those lists that charge for delisting. A new RFC document has been published that describes the best operational practices for the use of DNS-based… https://www.virusbulletin.com/blog/2012/01/new-rfc-describes-best-practices-running-dns-based-lists/

Vulnerability turns McAfee's anti-malware solution into open relay

Flaw allows for spam to be sent through customers' PCs.
Flaw allows for spam to be sent through customers' PCs. A vulnerability discovered in McAfee's SaaS for Total Protection, the company's hosted anti-malware solution, effectively… https://www.virusbulletin.com/blog/2012/01/vulnerability-turns-mcafee-s-anti-malware-solution-open-relay/

AV-Test releases latest results

Business and consumer products achieve high pass rate.
Business and consumer products achieve high pass rate. Independent testing lab AV-Test.org has released its latest batch of test results, with 23 consumer products and eight… https://www.virusbulletin.com/blog/2012/01/av-test-releases-latest-results/

Sykipot trojan used to target smart cards

Defence companies among small number of targets.
Defence companies among small number of targets. Researchers at Alienvault have discovered a version of the 'Sykipot' trojan that is being used to target organisations that make… https://www.virusbulletin.com/blog/2012/01/sykipot-trojan-used-target-smart-cards/

Spammers link to site containing QR code

Curious users may scan URL and end up on pharma websites.
Curious users may scan URL and end up on pharma websites. Researchers at Websense have discovered spam containing links to a site containing a QR code in which the spam's target… https://www.virusbulletin.com/blog/2012/01/spammers-link-site-containing-qr-code/

2012

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsDecember issue of VB published The December issue of Virus Bulletin is now available for subscribers to download. 03 December 2012Virus Bulletin announces VBWeb tests for web… https://www.virusbulletin.com/blog/2012/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/01/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.