VB Blog

VB2018 preview: Explain Ethereum smart contract hacking like I am five

Posted by   Martijn Grooten on   Aug 28, 2018

Designing smart contracts is hard: we preview a VB2018 paper on the blockchain-based platform Ethereum, that describes both how the technology works and how a number of security issues inherent to the platform have led to various high-profile and often very costly hacks.

Read more  

VB2017 video: Client Maximus raises the bar

Posted by   Martijn Grooten on   Aug 27, 2018

At VB2017, IBM Trusteer researcher Omer Agmon, presented a 'last-minute' paper in which he analysed the Client Maximum trojan, which targets Brazilian users of online banking. Today, we release the recording of his presentation.

Read more  

The security industry is genuinely willing to help you do good work

Posted by   Martijn Grooten on   Aug 21, 2018

For those organizations working for the public good, security vendors are often willing to offer their services for free, or for very low cost.

Read more  

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

Posted by   Martijn Grooten on   Aug 17, 2018

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

Read more  

VB2018 preview: From drive-by download to drive-by mining

Posted by   Martijn Grooten on   Aug 15, 2018

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Read more  

Red Eyes threat group targets North Korean defectors

Posted by   Martijn Grooten on   Aug 14, 2018

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on North Korea.

Read more  

VB announces Threat Intelligence Summit to take place during VB2018

Posted by   Martijn Grooten on   Aug 9, 2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

Read more  

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

Posted by   Martijn Grooten on   Aug 7, 2018

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

Read more  

VB2018 call for last-minute papers opened

Posted by   Martijn Grooten on   Jul 27, 2018

The call for last-minute papers for VB2018 is now open. Submit before 2 September to have your abstract considered for one of the nine slots reserved for 'hot' research.

Read more  

VB2017 paper and update: Browser attack points still abused by banking trojans

Posted by   Martijn Grooten on   Jul 25, 2018

At VB2017, ESET researchers Peter Kálnai and Michal Poslušný looked at how banking malware interacts with browsers. Today we publish their paper, share the video of their presentation, and also publish a guest blog post from Peter, in which he summarises the recent developments in this space.

Read more  

Search blog

VB100 for Windows Server 2008 results published

Latest VB100 results published - full report now also available.
Latest VB100 results published - full report now also available. The results of the VB100 comparative review on Windows Server 2008 R2 have been announced. This month's test… https://www.virusbulletin.com/blog/2011/06/windows-server-2008-results-published/

DroidKungFu command and control server may be mobile device

Android trojan makes use of root exploit.
Android trojan makes use of root exploit. Researchers at Fortinet have discovered a command and control server for the 'DroidKungFu' Android trojan that appears to be a mobile… https://www.virusbulletin.com/blog/2011/06/droidkungfu-command-and-control-server-may-be-mobile-device/

Outlook spam phishes for SMTP credentials

Login details would give spammers access to legitimate mail servers.
Login details would give spammers access to legitimate mail servers. A phishing scam has been identified that targets users of Microsoft Outlook and tries to obtain SMTP login… https://www.virusbulletin.com/blog/2011/06/outlook-spam-phishes-smtp-credentials/

Exploit kit targets customers of air travel websites

SpyEye configuration intercepts personal data submitted to legitimate websites.
SpyEye configuration intercepts personal data submitted to legitimate websites. Security researchers have uncovered a version of the 'SpyEye' trojan that steals credit card and… https://www.virusbulletin.com/blog/2011/06/exploit-kit-targets-customers-air-travel-websites/

Botnet rented for online extortion

Man who threatened World Cup bookmakers with DDoS attack convicted.
Man who threatened World Cup bookmakers with DDoS attack convicted. A German man who hired a botnet and used it to threaten bookmakers with DDoS attacks during the 2010 FIFA World… https://www.virusbulletin.com/blog/2011/06/botnet-rented-online-extortion/

US court: passwords reasonable security for online banking

Security question considered second authentication factor.
Security question considered second authentication factor. A US court has declared that a combination of passwords and 'security questions' is an ample way for banks to protect… https://www.virusbulletin.com/blog/2011/06/us-court-passwords-reasonable-security-online-banking/

Sophos red flags Google Analytics

Popular analytics tool mistakenly flagged as 'high risk'.
Popular analytics tool mistakenly flagged as 'high risk'. Security firm Sophos had an embarrassing moment this morning when its scanner flagged Google Analytics as malicious.… https://www.virusbulletin.com/blog/2011/06/sophos-red-flags-google-analytics/

Malicious PHP script hides bad stuff inside 'white-space'

Spaces and tabs used to encode into binary.
Spaces and tabs used to encode into binary. Researchers at Kaspersky have discovered a malicious PHP script that uses an inventive way to obfuscate its malicious behaviour. The… https://www.virusbulletin.com/blog/2011/06/malicious-php-script-hides-bad-stuff-inside-white-space/

Banking malware hosted on Amazon's cloud servers

Trojan targets mostly Brazilian banks.
Trojan targets mostly Brazilian banks. Researchers have discovered malware hosted on Amazon Web Services that steals victims' bank account data. Acting as a rootkit, the malware… https://www.virusbulletin.com/blog/2011/06/banking-malware-hosted-amazon-s-cloud-servers/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/06/june-issue-vb-published/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/06/

Facebook scam serving malware

Attack targeting Windows and Mac users in US and UK.
Attack targeting Windows and Mac users in US and UK. A Facebook scam that is doing the rounds at the moment - claiming to contain a 'freaky video' related to the ongoing case… https://www.virusbulletin.com/blog/2011/06/facebook-scam-serving-malware/

95% of spam monetized through three banks

Financial infrastructure possible bottleneck for spammers.
Financial infrastructure possible bottleneck for spammers. In a recently published paper, researchers from the University of California found that 95 per cent of spamvertised… https://www.virusbulletin.com/blog/2011/05/95-spam-monetized-through-three-banks/

Spammers use unicode trick to manipulate file names

Windows executable appears to be Word document.
Windows executable appears to be Word document. An unicode trick that reverses the order of some characters has been used by spammers to disguise malicious attachments as harmless… https://www.virusbulletin.com/blog/2011/05/spammers-use-unicode-trick-manipulate-file-names/

Canada new hotbed for cybercriminal activity

Country's IP addresses less likely to be scrutinized.
Country's IP addresses less likely to be scrutinized. Security firm Websense has reported a significant increase in cybercrime originating in Canada. Hitherto, Canada and… https://www.virusbulletin.com/blog/2011/05/canada-new-hotbed-cybercriminal-activity/

Zeus source code leaked

Banking trojan among the most advanced of its kind.
Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to… https://www.virusbulletin.com/blog/2011/05/zeus-source-code-leaked/

Smile, you're on a botnet!

Multi-platform Java botnet allows for remote control of webcam and microphone.
Multi-platform Java botnet allows for remote control of webcam and microphone. Researchers have discovered a multi-platform botnet running on the Java Runtime Environment (JRE)… https://www.virusbulletin.com/blog/2011/05/smile-you-re-botnet/

May

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/05/

May issue of VB published

The May issue of Virus Bulletin is now available for subscribers to download.
The May issue of Virus Bulletin is now available for subscribers to download. The May 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/05/may-issue-vb-published/

VB announces Virus Bulletin for Kindle

VB joins the e-book generation.
VB joins the e-book generation. With millions of people now using e-book readers as a convenient way to read while on the go - or simply to cut down on bookshelf space - VB is… https://www.virusbulletin.com/blog/2011/04/vb-announces-kindle/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.