VB Blog

VB2016 Call for Papers - Frequently Asked Questions

Posted by   Martijn Grooten on   Mar 11, 2016

Are you interested in submitting an abstract for VB2016? We've answered some frequently asked questions about the Call for Papers, which closes next week.

Read more  

Throwback Thursday: Hash Woes

Posted by   Helen Martin on   Mar 10, 2016

This Throwback Thursday we go back to 2004, when the entire crypto community was abuzz with the news that a group of Chinese researchers had demonstrated flaws in a whole set of hash functions - VB took a closer look to clarify the situation and draw lessons from the incident.

Read more  

VB2015 paper: Mobile Banking Fraud via SMS in North America: Who's Doing it and How

Posted by   Martijn Grooten on   Mar 2, 2016

Though SMS may have been claimed dead many time, it is still very much alive, and quite popular among mobile phishers. At VB2015, Adaptive Mobile researcher Cathal Mc Daid presented a paper various mobile phishing campaigns targeting North American banks.

Read more  

Throwback Thursday: Viruses on the Internet

Posted by   Helen Martin on   Feb 25, 2016

This Throwback Thursday VB heads back to 1996 when - long before the days of driveby downloads and exploit kits - VB published a report on the state of viruses on the Internet.

Read more  

RSA and BSides San Francisco

Posted by   Martijn Grooten on   Feb 24, 2016

Next week, Virus Bulletin Editor Martijn Grooten will attend the RSA conference in San Francisco, where he will give a talk entitled "How Broken Is Our Crypto Really?" He will also speak at BSides San Francisco, where he will give a talk entitled "Elliptic Curve Cryptography for Those Who are Afraid of Mathematics".

Read more  

Virus Bulletin publishes first web filter test report

Posted by   Martijn Grooten on   Feb 19, 2016

After a lot of preparation, Virus Bulletin is proud to have published the first "VBWeb" comparative web filter test report, in which products' ability to block web-based malware and drive-by downloads was tested. Fortinet's FortiGuard appliance was the first product to achieve a VBWeb certification.

Read more  

VB2015 paper: Will Android Trojans, Worms or Rootkits Survive in SEAndroid and Containerization?

Posted by   Martijn Grooten on   Feb 18, 2016

Sophos researchers Rowland Yu and William Lee look at whether recent security enhancements to Android, such as SEAndroid and containerization, will be enough to defeat future malware threats.

Read more  

First six VB2016 sponsors announced

Posted by   Martijn Grooten on   Feb 17, 2016

Virus Bulletin is excited to announce the first six sponsors for VB2016, the 26th international Virus Bulletin conference, which will take place in Denver, Colorado, USA 5-7 October 2016.

Read more  

VB2015 paper: Sizing cybercrime: incidents and accidents, hints and allegations

Posted by   Martijn Grooten on   Feb 11, 2016

Cybercrime is big. But how big is it really? In a paper presented at VB2015 and together with the presentation video published on our website today, ESET researcher Stephen Cobb looks at previous studies that attempt the size of cybercrime and asks why we need such data and what can be done better.

Read more  

Throwback Thursday: The Thin Blue Line

Posted by   Helen Martin on   Feb 11, 2016

This Throwback Thursday, VB heads back to 1994 when UK Fraud Squad detectives started making inroads into the most puzzling 'Whodunnit' since the Great Train Robbery. Had an outbreak of computer crime swept Britain? No, it was all part of a police training program.

Read more  

Search blog

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.
Dissecting the Design and Vulnerabilities in AZORult C&C Panels Read the paper (HTML) Download the paper (PDF)   If you have some research you'd like to share with the… https://www.virusbulletin.com/blog/2021/04/new-article-dissecting-design-and-vulnerabilities-azorult-cc-panels/

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.
Earlier this week VB took the tough decision to cancel the in-person version of VB2021 in Prague. We had really hoped to be able to host an in-person event this year, but with… https://www.virusbulletin.com/blog/2021/03/vb2021-localhost-call-papers-great-opportunity/

New article: Excel Formula/Macro in .xlsb?

In a follow-up to an article published last week, Kurt Natvig takes us through the analysis of a new malicious sample using the .xlsb file format.
Excel Formula/Macro in .xlsb? Read the paper (HTML) Download the paper (PDF)   Excel Formula, or XLM – does it ever stop giving pain to researchers? So asks Forcepoint… https://www.virusbulletin.com/blog/2021/02/new-article-excel-formulamacro-xlsb/

New article: Decompiling Excel Formula (XF) 4.0 malware

In a new article, researcher Kurt Natvig takes a close look at XF 4.0 malware.
Decompiling Excel Formula (XF) 4.0 malware Read the paper (HTML) Download the paper (PDF)   Office malware has been around for a long time, but until recently Excel Formula… https://www.virusbulletin.com/blog/2021/02/new-article-decompiling-excel-formula-xf-40-malware/

The Bagsu banker case - presentation

At VB2019, CSIS researcher Benoît Ancel spoke about a quiet banking trojan actor that has been targeting German users since at least 2014.
Some time ago, researchers at CSIS Security Group discovered the infrastructure of a "quiet" banking trojan actor that had been targeting German users since at least 2014. At… https://www.virusbulletin.com/blog/2021/01/bagsu-banker-case-presentation/

VB2021 call for papers - now open, to all!

The call for papers for VB2021 is now open and we want to hear from you - we're planning for flexible presentation formats, so everyone is encouraged to submit, regardless of whether or not you know at this stage whether you'll be able to travel to Prague…
2020 proved to be an extraordinary – in the true sense of the word – year for everyone, and 2021 has already thrown some curveballs in the short few weeks since it began.… https://www.virusbulletin.com/blog/2021/01/vb2021-call-papers-now-open-all/

In memoriam: Yonathan Klijnsma

We were very sorry to learn of the passing of researcher Yonathan Klijnsma last week. Here, former VB Editor Martijn Grooten shares his memories of a talented researcher and a very kind person: this month, infosec lost a really good one.
We were very sorry to learn of the passing of researcher Yonathan Klijnsma last week and we offer our deepest condolences to his family and friends. Here, former VB Editor Martijn… https://www.virusbulletin.com/blog/2021/01/memoriam-yonathan-klijnsma/

VB2020 localhost videos available on YouTube

VB has made all VB2020 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.
Today, VB has made all VB2020 localhost presentations available on VB's YouTube channel, so you can now watch – and share – any part of the conference freely and without… https://www.virusbulletin.com/blog/2021/01/vb2020-localhost-videos-available-youtube/

VB2020 presentation & paper: 2030: backcasting the potential rise and fall of cyber threat intelligence

At VB2020 localhost, threat intelligence consultant Jamie Collier used the analytical technique of backcasting to look at the rise and fall of the cyber threat intelligence industry.
Backcasting is an analytical technique that establishes an imagined future scenario and then works backwards to understand what caused that outcome. At VB2020, FireEye's Jamie… https://www.virusbulletin.com/blog/2020/12/vb2020-presentation-paper-2030-backcasting-potential-rise-and-fall-cyber-threat-intelligence/

VB2020 presentation: Behind the Black Mirror: simulating attacks with mock C2 servers

At VB2020 localhost, Carbon Black's Scott Knight presented an approach he and his colleagues have taken to more realistically simulate malware attacks.
Dynamic analysis of a malicious sample in a lab setup can be hampered by the absence of the malware's C2 server listening and providing responses – potentially resulting in only a… https://www.virusbulletin.com/blog/2020/12/vb2020-presentation-behind-black-mirror-simulating-attacks-mock-c2-servers/

VB2020 presentation & paper: Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools

At VB2020, researcher Paul Litvak revealed how he put together a comprehensive map of threat actor use of open-source offensive security tools.
The development and publication of offensive security tools (OSTs) is a point of great controversy in the information security community: while some argue that releasing such… https://www.virusbulletin.com/blog/2020/12/vb2020-presentation-paper-advanced-pasta-threat-mapping-threat-actor-usage-open-source-offensive-security-tools/

VB2020 presentation: Evolution of Excel 4.0 macro weaponization

At VB2020 localhost James Haughom, Stefano Ortolani and Baibhav Singh gave a presentation in which they described how XL4 macros are being weaponised and the evolution of the techniques used.
The use by attackers of legitimate Excel 4.0 (XL4) macros as a simple and reliable method to gain a foothold on a target network is becoming increasingly popular and presents a… https://www.virusbulletin.com/blog/2020/11/vb2020-presentation-evolution-excel-40-macro-weaponization/

Cybersecurity Assessment Tool launched by Ford Foundation

The Ford Foundation has launched a tool designed to help nonprofit organizations assess their own cybersecurity efforts.
The Ford Foundation has launched a tool designed to help nonprofit organizations assess their own cybersecurity efforts. The Cybersecurity Assessment Tool is specifically aimed… https://www.virusbulletin.com/blog/2020/11/cybersecurity-assessment-tool-launched-ford-foundation/

VB2020 presentation: Another threat actor day…

At VB2020 localhost Paul Jung, of Excellium Services, detailed an incident response that he and his team faced when, in December 2019, a Belgian hospital required their help to manage a breach of their informations system.
Hospitals can be attractive places for hackers. With access to critical medical records and personally identifiable information, there is great opportunity to exploit patients.… https://www.virusbulletin.com/blog/2020/11/vb2020-presentation-another-threat-actor-day/

VB2020 presentation: Ramsay: a cyber-espionage toolkit tailored for air-gapped networks

At VB2020 localhost, ESET researcher Ignacio Sanmillan spoke about Ramsay, a toolkit specifically designed to steal documents and operate within air-gapped networks.
Air gapping is a network security measure commonly used in military/governmental, financial and industrial control systems networks that is applied to one or more computers in… https://www.virusbulletin.com/blog/2020/11/vb2020-presentation-ramsay-cyber-espionage-toolkit-tailored-air-gapped-networks/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.