VB Blog

Subtle change could see a reduction in installation of malicious Chrome extensions

Posted by   Martijn Grooten on   Jun 13, 2018

Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions.

Read more  

Paper: EternalBlue: a prominent threat actor of 2017–2018

Posted by   Martijn Grooten on   Jun 11, 2018

We publish a paper by researchers from Quick Heal Security Labs in India, who study the EternalBlue and DoublePulsar exploits in full detail.

Read more  

'North Korea' a hot subject among VB2018 talks

Posted by   Virus Bulletin on   Jun 1, 2018

Several VB2018 papers deal explicitly or implicitly with threats that have been attributed to North Korean actors.

Read more  

Expired domain led to SpamCannibal's blacklist eating the whole world

Posted by   Martijn Grooten on   May 31, 2018

The domain of the little-used SpamCannibal DNS blacklist had expired, resulting in it effectively listing every single IP address.

Read more  

MnuBot banking trojan communicates via SQL server

Posted by   Martijn Grooten on   May 30, 2018

Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.

Read more  

Throwback Thursday: Giving the EICAR test file some teeth

Posted by   Martijn Grooten on   May 24, 2018

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

Read more  

XMRig used in new macOS cryptominer

Posted by   Martijn Grooten on   May 23, 2018

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Read more  

Tendency for DDoS attacks to become less volumetric fits in a wider trend

Posted by   Martijn Grooten on   May 22, 2018

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Read more  

Turkish Twitter users targeted with mobile FinFisher spyware

Posted by   Martijn Grooten on   May 15, 2018

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Read more  

Hide'n'Seek IoT botnet adds persistence

Posted by   Martijn Grooten on   May 9, 2018

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.

Read more  

Search blog

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/12/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/12/december-issue-vb-published/

Spamhaus CIO calls for those running open DNS resolvers to be fined

Open DNS resolvers instrumental in many DDoS attacks.
Open DNS resolvers instrumental in many DDoS attacks. At the Cyber Security Summit in London, Richard Cox, CIO of DNS blacklist provider Spamhaus, called on the UK government to… https://www.virusbulletin.com/blog/2013/11/spamhaus-cio-calls-those-running-open-dns-resolvers-be-fined/

Privilege escalation vulnerability targets Windows XP and Server 2003

Vulnerability being used in the wild in combination with exploit of patched Adobe Reader vulnerability.
Vulnerability being used in the wild in combination with exploit of patched Adobe Reader vulnerability. Researchers at FireEye have discovered a new privilege escalation… https://www.virusbulletin.com/blog/2013/11/privilege-escalation-vulnerability-targets-windows-xp-and-server-2003/

There is a place for unauthenticated key exchange, but don't tell anyone

Making dragnet surveillance harder justifies using weak form of encryption.
Making dragnet surveillance harder justifies using weak form of encryption. Discussions on how to make the Internet more secure have been going on ever since the first two… https://www.virusbulletin.com/blog/2013/11/there-place-unauthenticated-key-exchange-don-t-tell-anyone/

NCA issues alert on CryptoLocker ransomware

Malware demands $1,000 ransom to decrypt files.
Malware demands $1,000 ransom to decrypt files. This weekend, the UK's National Crime Agency (NCA) issued an alert about the 'CryptoLocker' ransomware - following a similar alert… https://www.virusbulletin.com/blog/2013/11/nca-issues-alert-cryptolocker-ransomware/

Industry suffers loss of great researcher

Untimely death of Peter Ször sends shockwaves across anti-malware community.
Untimely death of Peter Ször sends shockwaves across anti-malware community. We were shocked and saddened to learn, yesterday, of the sudden and unexpected death of security… https://www.virusbulletin.com/blog/2013/11/industry-suffers-loss-great-researcher/

'123456' may be an adequate password to protect nothing

Are we giving users the right kind of advice when it comes to password security?
Are we giving users the right kind of advice when it comes to password security? A recent data-breach at Adobe has shown once again that a lot of users choose the most trivial of… https://www.virusbulletin.com/blog/2013/11/123456-may-be-adequate-password-protect-nothing/

Good and bad news for victims of targeted attacks against Microsoft products

Bug bounty program extended; TIFF zero-day used in the wild.
Bug bounty program extended; TIFF zero-day used in the wild. This week, Microsoft has good news and bad news for those targeted by zero-day exploits in its products. The bad… https://www.virusbulletin.com/blog/2013/11/good-and-bad-news-victims-targeted-attacks-against-microsoft-products/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/11/

November issue of VB published

The November issue of Virus Bulletin is now available for subscribers to download.
The November issue of Virus Bulletin is now available for subscribers to download. The November 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/11/november-issue-vb-published/

Open letter asks AV companies for openness on surveillance malware

Old issue has become hot topic again following Snowden revelations.
Old issue has become hot topic again following Snowden revelations. A group of experts in privacy and digital rights has sent an open letter (pdf) to a number of anti-virus… https://www.virusbulletin.com/blog/2013/10/open-letter-asks-av-companies-openness-surveillance-malware/

Php.net compromised to serve malware

Researchers initially believed Google warning was a false positive.
Researchers initially believed Google warning was a false positive. For a few days this week, the popular php.net website was serving malware to some of its visitors and was doing… https://www.virusbulletin.com/blog/2013/10/php-net-compromised-serve-malware/

Should software vendors extend support for their products on Windows XP?

Is Google making the Internet more or less secure by extending support for Chrome on XP?
Is Google making the Internet more or less secure by extending support for Chrome on XP? A software vendor's decision to release updates to its product is generally seen as a good… https://www.virusbulletin.com/blog/2013/10/should-software-vendors-extend-support-their-products-windows-xp/

October issue of VB published

The October issue of Virus Bulletin is now available for subscribers to download.
The October issue of Virus Bulletin is now available for subscribers to download. The October 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/10/october-issue-vb-published/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/10/

VB2013 speaker spotlight

We speak to VB2013 presenter Methusela Ferrer about her research interests and what she aims to bring to VB2013.
We speak to VB2013 presenter Methusela Ferrer about her research interests and what she aims to bring to VB2013. The VB2013 conference takes place next week (2-4 October) in… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-ferrer/

VB2013 speaker spotlight

We speak to VB2013 presenter Jarno Niemela about APTs and about what he aims to bring to VB2013.
We speak to VB2013 presenter Jarno Niemela about APTs and about what he aims to bring to VB2013. The VB2013 conference takes place next week (2-4 October) in Berlin, with an… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-niemela/

Tens of thousands of fake Twitter accounts passed off and sold as 'followers'

After initial takedown, more efforts put into making new fake accounts look genuine.
After initial takedown, more efforts put into making new fake accounts look genuine.Virus Bulletin's research into a scam selling fake Twitter accounts being passed off as… https://www.virusbulletin.com/blog/2013/09/tens-thousands-fake-twitter-accounts-passed-and-sold-followers/

VB2013 speaker spotlight

We speak to VB2013 presenter Rowland Yu about Android malware, his research interests, and what he aims to bring to VB2013.
We speak to VB2013 presenter Rowland Yu about Android malware, his research interests, and what he aims to bring to VB2013. The VB2013 conference takes place next month (2-4… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-yu/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.