VB Blog

Avast to present technical details of CCleaner hack at VB2017

Posted by   Martijn Grooten on   Oct 2, 2017

The recently discovered malicious CCleaner version has become one of the biggest security stories of 2017. Two researchers from Avast, the company that had recently acquired CCleaner developer Piriform, will share the results of their investigations at VB2017 in Madrid this week.

Read more  

VB2017 preview: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Posted by   Martijn Grooten on   Oct 2, 2017

We preview the VB2017 paper by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Costin Raiu on fourth-party collection and its implications for attack attribution.

Read more  

VB2017 preview: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Sep 29, 2017

We preview Patrick Wardle's VB2017 paper, in which the Synack researcher analyses the mysterious OSX/FruitFly malware by setting up a custom C&C server.

Read more  

VB2017 - information for press

Posted by   Martijn Grooten on   Sep 28, 2017

More than 50 security industry experts will present conference papers to their peers at VB2017 next week, and there are several papers on the programme with a certain newsworthiness. There is still time for cybersecurity journalists to apply for a press pass.

Read more  

VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

We preview the VB2017 paper by Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) who combine an actor-centric and a network-centric approach to analysing bulletproof hosting operations.

Read more  

Test your technical and mental limits in the VB2017 foosball tournament

Posted by   Martijn Grooten on   Sep 22, 2017

As has become tradition, VB2017 will once again see a security industry table football tournament. Register your team now for some great fun and adrenaline-filled matches in between sessions in Madrid!

Read more  

The case against running Windows XP is more subtle than we think it is

Posted by   Martijn Grooten on   Sep 21, 2017

Greater Manchester Police is one of many organizations still running Windows XP on some of its systems. This is bad practice, but the case against running XP is far more subtle than we often pretend it is.

Read more  

Hot FinSpy research completes VB2017 programme

Posted by   Martijn Grooten on   Sep 21, 2017

Researchers from ESET have found a new way in which the FinSpy/FinFisher 'government spyware' can infect users, details of which they will present at VB2017 in Madrid.

Read more  

Transparency is essential when monitoring your users' activities

Posted by   Virus Bulletin on   Sep 20, 2017

Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

Read more  

VB2017 preview: Android reverse engineering tools: not the usual suspects

Posted by   Martijn Grooten on   Sep 19, 2017

We preview the VB2017 paper by Fortinet researcher Axelle Apvrille, in which she looks at some less obvious tools for reverse engineering Android malware.

Read more  

Search blog

Dutch ISP sues Spamhaus for 'extortion'

Blacklist entries 'unfair and illegal'.
Blacklist entries 'unfair and illegal'. Dutch ISP A2B Internet has sued The Spamhaus Project, claiming the project unfairly blacklisted its IP range. A2B provides the upstream… https://www.virusbulletin.com/blog/2011/10/dutch-isp-sues-spamhaus-extortion/

Google AdWords phishing campaign spreads

Users urged to login because of 'issues'.
Users urged to login because of 'issues'. A new phishing campaign that targets users of Google AdWords looks worryingly real, GFI reports. The phish begins with an email claiming… https://www.virusbulletin.com/blog/2011/10/google-adwords-phishing-campaign-spreads/

Mac trojan is VMware-aware

Malicious execution stopped when virtual environment is detected.
Malicious execution stopped when virtual environment is detected. Researchers at F-Secure have found a variant of the 'Flashback' trojan for Mac (a fake Adobe Flash Player update)… https://www.virusbulletin.com/blog/2011/10/mac-trojan-vmware-aware/

Government trojan found on German computers

Four states admit the use of spyware.
Four states admit the use of spyware. Controversy has arisen in Germany, after the well-known CCC hacker group reported that it had found a trojan that was used to spy on behalf of… https://www.virusbulletin.com/blog/2011/10/government-trojan-found-german-computers/

VB conference hashtag used to spread malware

Tweet promising conference news links to trojan.
Tweet promising conference news links to trojan. A tweet using the #vb2011 hashtag, which was used in numerous tweets referring to last week's VB2011 conference, contained a link… https://www.virusbulletin.com/blog/2011/10/vb-conference-hashtag-used-spread-malware/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/10/

October issue of VB published

The October issue of Virus Bulletin is now available for subscribers to download.
The October issue of Virus Bulletin is now available for subscribers to download. The October 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/10/october-issue-vb-published/

Mysql.com hacked, serving malware

Root access to site offered on black market.
Root access to site offered on black market. Yesterday, mysql.com, the official website of the popular database management system MySQL, was hacked and visitors to the website were… https://www.virusbulletin.com/blog/2011/09/mysql-com-hacked-serving-malware/

E-marketing companies compromised to send spam

Fake order confirmations contain malicious links.
Fake order confirmations contain malicious links. Spammers have gained access to the accounts of email service providers (ESPs) and used them to send out fake order confirmation… https://www.virusbulletin.com/blog/2011/09/e-marketing-companies-compromised-send-spam/

Alureon trojan uses steganography to receive commands

Messages hidden inside images create extra layer of redundancy.
Messages hidden inside images create extra layer of redundancy. Researchers at Microsoft have discovered a new variant of the 'Alureon' trojan that uses steganography to make… https://www.virusbulletin.com/blog/2011/09/alureon-trojan-uses-steganography-receive-commands/

Attack targets government agencies in CIS countries

Trojans used to steal specific files.
Trojans used to steal specific files. Researchers at Trend Micro have discovered an ongoing targeted attack against, among others, government agencies and diplomatic missions in… https://www.virusbulletin.com/blog/2011/09/attack-targets-government-agencies-cis-countries/

New RFC grants DKIM improved status

Email signing method now 'Draft Standard'.
Email signing method now 'Draft Standard'. The Internet Engineering Task Force (IETF) has published a new RFC describing the DKIM protocol which sees its status advance from… https://www.virusbulletin.com/blog/2011/09/new-rfc-grants-dkim-improved-status/

Trojan steals money from bank accounts via 'training session'

Social engineering circumvents banking security
Social engineering circumvents banking security In a new method of stealing money from customer accounts, a variant of the SpyEye trojan invites the user to make a supposedly… https://www.virusbulletin.com/blog/2011/09/trojan-steals-money-bank-accounts-training-session/

Malicious spam campaigns leave experts puzzled

Increase in malware in spam has not led to increase in malicious activity.
Increase in malware in spam has not led to increase in malicious activity. Security researchers have noticed a significant increase in the quantity of spam sent with malicious… https://www.virusbulletin.com/blog/2011/09/malicious-spam-campaigns-leave-experts-puzzled/

Bank's Twitter account hacked to send phishing messages

Important lessons for companies engaging in social media.
Important lessons for companies engaging in social media. Last week, the Twitter account of the Bank of Melbourne was hacked and used to send direct messages containing phishing… https://www.virusbulletin.com/blog/2011/09/bank-s-twitter-account-hacked-send-phishing-messages/

Diginotar declared bankrupt

Browsers and operating systems had already revoked trust in Dutch CA.
Browsers and operating systems had already revoked trust in Dutch CA. Dutch certificate authority Diginotar was declared bankrupt by a Dutch court this morning. Diginotar made the… https://www.virusbulletin.com/blog/2011/09/diginotar-declared-bankrupt/

Confirmed newsletter subscriptions half as likely to be blocked

Good practice means good performance.
Good practice means good performance. Newsletters that do not confirm their subscriptions are twice as likely to be blocked by spam filters as those that do, Virus Bulletin has… https://www.virusbulletin.com/blog/2011/09/confirmed-newsletter-subscriptions-half-likely-be-blocked/

Windows Help Files used in targeted attacks

Files with code-executing properties attached to emails.
Files with code-executing properties attached to emails. Researchers at Symantec have discovered Windows Help Files being used in targeted attacks. Such help files, which use the… https://www.virusbulletin.com/blog/2011/09/windows-help-files-used-targeted-attacks/

Latest VBSpam certification results published

Latest VBSpam results published - full report now also available.
Latest VBSpam results published - full report now also available. The results of the September VBSpam comparative review have been announced. This month's VBSpam test sees 23… https://www.virusbulletin.com/blog/2011/09/latest-vbspam-certification-results-published/

Iranians spied on using rogue DigiNotar certificates

Fake certificates signed for CIA, Mossad, Google, Facebook.
Fake certificates signed for CIA, Mossad, Google, Facebook. It is likely that Iranian Internet users have been spied on following a hack discovered at Dutch certificate authority… https://www.virusbulletin.com/blog/2011/09/iranians-spied-using-rogue-diginotar-certificates/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.