VB Blog

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

Posted by   Martijn Grooten on   Nov 22, 2019

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his presentation.

Read more  

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Posted by   Martijn Grooten on   Nov 21, 2019

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution and the affiliate scheme behind it. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Domestic Kitten: an Iranian surveillance program

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video of their presentation.

Read more  

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

Read more  

VB2019 paper: DNS on fire

Posted by   Martijn Grooten on   Nov 7, 2019

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

Read more  

German Dridex spam campaign is unfashionably large

Posted by   Martijn Grooten on   Nov 6, 2019

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Read more  

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

Posted by   Martijn Grooten on   Nov 5, 2019

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

Read more  

Emotet continues to bypass many email security products

Posted by   Martijn Grooten on   Nov 4, 2019

Having returned from a summer hiatus, Emotet is back targeting inboxes and, as seen in the VBSpam test lab, doing a better job than most other malicious campaigns at bypassing email security products.

Read more  

VB2019 paper: We need to talk - opening a discussion about ethics in infosec

Posted by   Martijn Grooten on   Nov 1, 2019

Those working in the field of infosec are often faced with ethical dilemmas that are impossible to avoid. Today, we publish a VB2019 paper by Kaspersky researcher Ivan Kwiatkowski looking at ethics in infosec as well as the recording of Ivan's presentation.

Read more  

Stalkerware poses particular challenges to anti-virus products

Posted by   Martijn Grooten on   Oct 31, 2019

Malware used in domestic abuse situations is a growing threat, and the standard way for anti-virus products to handle such malware may not be good enough. But that doesn't mean there isn't an important role for anti-virus to play.

Read more  

Search blog

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

Microsoft no longer publishes advance notifications for its Patch Tuesdays

Company unhappy with Google going full disclosure on privilege escalation vulnerability.
Company unhappy with Google going full disclosure on privilege escalation vulnerability. Tomorrow is the second Tuesday of the month and, as most people reading this blog will… https://www.virusbulletin.com/blog/2015/01/microsoft-no-longer-publishes-advance-notifications-its-patch-tuesdays/

VB2014 Paper: Attack surface analysis of Tizen devices

Irfan Asrar looks at the security of the operating system used in many IoT devices.
Irfan Asrar looks at the security of the operating system used in many IoT devices.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014… https://www.virusbulletin.com/blog/2015/01/paper-attack-surface-analysis-tizen-devices/

New VB100 and VBSpam test results published

See which anti-malware and anti-spam solutions achieved certification.
See which anti-malware and anti-spam solutions achieved certification. Shortly before the Christmas holidays, we published a new VB100 anti-malware test report as well as a new… https://www.virusbulletin.com/blog/2015/01/new-and-vbspam-test-results-published/

VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.
Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.Since the close of the VB2014 conference in Seattle in October, we… https://www.virusbulletin.com/blog/2015/01/paper-unveiling-kernel-rootkit-discovery-using-selective-automated-kernel-memory-differencing/

Virus Bulletin wishes you a great 2015

See you in Prague - and on the Internet!
See you in Prague - and on the Internet! 2014 was an exciting year for Virus Bulletin: we made all of our content free, ran a successful and well-attended conference in Seattle,… https://www.virusbulletin.com/blog/2015/01/wishes-you-great-2015/

2015

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsCall for Papers: VB2016 DenverVB seeks submissions for the 26th Virus Bulletin Conference. 22 December 2015VB2015 video: Making a dent in Russian mobile banking… https://www.virusbulletin.com/blog/2015/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/01/

Conference review: Botconf 2014

Second edition of 'botnet fighting conference' another great success.
Second edition of 'botnet fighting conference' another great success. I had been looking forward to the second edition of the Botconf conference ever since I came back from the… https://www.virusbulletin.com/blog/2014/12/conference-review-botconf-2014/

Call for Papers: VB2015 Prague

VB seeks submissions for the 25th Virus Bulletin Conference.
VB seeks submissions for the 25th Virus Bulletin Conference.Virus Bulletin is seeking submissions from those wishing to present papers at VB2015, which will take place 30 September… https://www.virusbulletin.com/blog/2014/12/call-papers-prague/

Book review: Countdown to Zero Day

Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics.
Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics. There is a tendency among the media to call every hack 'advanced', to… https://www.virusbulletin.com/blog/2014/12/book-review-countdown-zero-day/

Virus Bulletin announces platinum sponsors for VB2015

More sponsorship opportunities available.
More sponsorship opportunities available. While the opening of VB2015 in Prague is still more than nine months away, we have already started with the preparations for what will be… https://www.virusbulletin.com/blog/2014/12/announces-platinum-sponsors/

VB2014 paper: Smart home appliance security and malware

Jeongwook Oh demonstrates how to hack a Samsung smart TV.
Jeongwook Oh demonstrates how to hack a Samsung smart TV.Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations.… https://www.virusbulletin.com/blog/2014/12/paper-smart-home-appliance-security-and-malware/

Virus Bulletin is hiring

VB seeks a Perl Developer / Security Engineer.
VB seeks a Perl Developer / Security Engineer. 2014 has been an exciting year for Virus Bulletin: we went through some personnel changes, made all of our content freely available,… https://www.virusbulletin.com/blog/2014/12/hiring/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/12/

Conference report: VB2014

The biggest and broadest ranging Virus Bulletin conference ever was a great success.
The biggest and broadest ranging Virus Bulletin conference ever was a great success. There is a Dutch expression that says that you shouldn't trust a butcher who judges his own… https://www.virusbulletin.com/blog/2014/11/conference-report/

VB2014 paper: Labelling spam through the analysis of protocol patterns

What do your IP packet sizes say about whether you're a spammer?
What do your IP packet sizes say about whether you're a spammer?Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the… https://www.virusbulletin.com/blog/2014/11/paper-labelling-spam-through-analysis-protocol-patterns/

Multi-staged, modular Regin tool enables stealthy surveillance

Nation state likely behind campaign that goes back many years.
Nation state likely behind campaign that goes back many years. Few terms are misused in a security context as often as the term 'advanced', perhaps in part because the industry… https://www.virusbulletin.com/blog/2014/11/multi-staged-modular-regin-tool-enables-stealthy-surveillance/

Detekt tool searches PCs for traces of surveillance spyware

Second opinion essential in circumstances under which likely victims operate.
Second opinion essential in circumstances under which likely victims operate. Last week, the release of the free 'Detekt' tool was announced. Developed by Claudio Guarnieri and… https://www.virusbulletin.com/blog/2014/11/detekt-tool-searches-pcs-traces-surveillance-spyware/

Botconf 2014 preview

Many VB authors and presenters to speak at second botnet-fighting conference.
Many VB authors and presenters to speak at second botnet-fighting conference. Last year, I attended the first edition of 'Botconf' in the French city of Nantes. I really enjoyed… https://www.virusbulletin.com/blog/2014/11/botconf-2014-preview/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.