VB Blog

Paper: New Keylogger on the Block

Posted by   Martijn Grooten on   Jul 5, 2016

In a new paper published by Virus Bulletin, Sophos researcher Gabor Szappanos takes a look at the KeyBase keylogger, sold as a commercial product and popular among cybercriminals who use it in Office exploit kits.

Read more  

BSides Denver to take place the day after VB2016

Posted by   Martijn Grooten on   Jun 28, 2016

VB2016, the 26th International Virus Bulletin conference, is an excellent reason to go to Denver, Colorado in the first week of October. But there is another reason to come to Denver: BSides Denver, which will take place the day after VB2016, on Saturday 8 October 2016.

Read more  

VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format

Posted by   Virus Bulletin on   Jun 13, 2016

In their VB2015 paper, Peter Kálnai and Jaromír Hořejší look at the current state of DDoS trojans forming covert botnets on unsuspecting systems. The paper provides a technical analysis of the most important malware families, focusing on infection methods, dynamic behaviour, C&C communication, obfuscation techniques, advanced methods of persistence and stealth, and elimination of rivals.

Read more  

Throwback Thursday: Hyppönen, that Data Fellow / Finnish Sprayer

Posted by   Helen Martin on   Jun 2, 2016

This week, well known and universally respected industry guru Mikko Hyppönen celebrates his 25th anniversary of working at F-Secure (formerly known as Data Fellows). VB takes a look back in the archives at two articles published in 1994: an "insight" into the life and work of the then rising star of the anti-virus world, and a virus analysis penned by the man himself.

Read more  

VB2015 paper: Economic Sanctions on Malware

Posted by   Helen Martin on   Jun 1, 2016

Financial pressure can be a proactive and potentially very effective tool in making our computer ecosystems safer. By cleverly employing various trust metrics and technologies such as digital signing, watermarking, and public-key infrastructure in strategically selected places, we can encourage good behaviours and punish bad ones. In his VB2015 paper, Igor Muttik analyses and gives examples of technologies (certificates, credentials, etc.) to de-incentivize bad behaviours in several ecosystems (Windows, Android, iOS).

Read more  

Virus Bulletin's job site for recruiters and job seekers

Posted by   Martijn Grooten on   May 26, 2016

Virus Bulletin has relaunched its security job vacancy service and added a new section, in which job seekers can advertise their skills and experience.

Read more  

Throwback Thursday: One_Half: The Lieutenant Commander?

Posted by   Helen Martin on   May 26, 2016

In October 1994, a new multi-partite virus appeared, using some of the techniques developed by the Dark Avenger in Commander_Bomber. As if this were not enough, the One_Half virus could also encrypt vital parts of the fixed disk. Eugene Kaspersky provided a detailed analysis.

Read more  

Advertisements on Blogspot sites lead to support scam

Posted by   Martijn Grooten on   May 9, 2016

Support scam pop-ups presented through malicious advertisements show that, next to vulnerable end points, gullible users remain an easy source of money for online criminals.

Read more  

To make Tor work better on the web, we need to be honest about it

Posted by   Martijn Grooten on   May 6, 2016

Many websites put barriers in front of visitors who use the Tor network. If we want to make the web more accessible through Tor, we need to be honest about why this is done, rather than cry wolf about a dislike for privacy, Martijn Grooten says.

Read more  

Paper: How It Works: Steganography Hides Malware in Image Files

Posted by   Martijn Grooten on   Apr 28, 2016

A new paper by CYREN researcher Lordian Mosuela takes a close look at Gatak, or Stegoloader, a piece of malware that was discovered last year and that is controlled via malicious code embedded in a PNG image, a technique known as steganography.

Read more  

Search blog

Symbian worm sighted in the wild

Malware pretends to be media or image file.
Malware pretends to be media or image file. A new worm has been sighted in the wild that operates on the Symbian operating system, which is used on many mobile phones. The worm,… https://www.virusbulletin.com/blog/2008/01/symbian-worm-sighted-wild/

Google links scam Avira users

Suspect firm advertising via Google found to be specialising in hijacking security brands.
Suspect firm advertising via Google found to be specialising in hijacking security brands.Google searches for Avira and the company's anti-malware product Antivir, a free version… https://www.virusbulletin.com/blog/2008/01/google-links-scam-avira-users/

US agencies report vishing, extortion, danger of hacking

FBI name used in email attacks, CIA warns of power supply hacks.
FBI name used in email attacks, CIA warns of power supply hacks. US security and law enforcement agencies were more than usually active in the computer security world last week,… https://www.virusbulletin.com/blog/2008/01/us-agencies-report-vishing-extortion-danger-hacking/

Help for victims of e-crime

Cybercrime support website launched.
Cybercrime support website launched. A website dedicated to helping victims of online crime and other incidents has been launched in the UK. The site, www.e-victims.org, aims to… https://www.virusbulletin.com/blog/2008/01/help-victims-e-crime/

Malcode from Mexico and Africa predicted to boom

Developing world expected to contribute heavily to future cybercrime.
Developing world expected to contribute heavily to future cybercrime. A report from F-Secure has predicted increasing levels of malware creation and operation in 'developing'… https://www.virusbulletin.com/blog/2008/01/malcode-mexico-and-africa-predicted-boom/

Microsoft alert on Excel vulnerability

Targeted exploitation of zero-day flaw seen in wild.
Targeted exploitation of zero-day flaw seen in wild.Microsoft has issued a security advisory on an unresolved vulnerability in its Excel software, which has been reported as a… https://www.virusbulletin.com/blog/2008/01/microsoft-alert-excel-vulnerability/

Stormy love letters

Storm botnet celebrates birthday with new wave of spam.
Storm botnet celebrates birthday with new wave of spam. Earlier this week malware experts warned of likely increased activity of the Storm botnet around Valentine's Day next month.… https://www.virusbulletin.com/blog/2008/01/stormy-love-letters/

Rogue anti-malware targets Mac users

Scam expands horizons to draw in new market of victims.
Scam expands horizons to draw in new market of victims. The rogue anti-malware scam, in which fake anti-spyware and anti-virus products are inveigled into victims' machines,… https://www.virusbulletin.com/blog/2008/01/rogue-anti-malware-targets-mac-users/

Phishing danger increases as Storm botnet is hired out

Smart new trojan and Storm diversification add to online banking risk.
Smart new trojan and Storm diversification add to online banking risk. The dangers of banking online grew significantly in past weeks, as portions of the ever-expanding Storm… https://www.virusbulletin.com/blog/2008/01/phishing-danger-increases-storm-botnet-hired-out/

Hundreds of legitimate websites being hacked into

New mass infection leaves security researchers puzzled.
New mass infection leaves security researchers puzzled. Web security company ScanSafe has reported a new mass infection of websites, which it claims accounts for 15% of the web… https://www.virusbulletin.com/blog/2008/01/hundreds-legitimate-websites-being-hacked/

Spam printing proof-of-concept revealed

Lack of security allows websites to send spammish content to network printers.
Lack of security allows websites to send spammish content to network printers. Opening your inbox on a Monday morning and finding out that it's full of spam is bad enough already,… https://www.virusbulletin.com/blog/2008/01/spam-printing-proof-concept-revealed/

Usual fare for holiday season

Storm ecards and social site spyware mark unsurprising year end.
Storm ecards and social site spyware mark unsurprising year end. With large portions of the globe celebrating various festivals over the past few weeks, an expected upsurge in… https://www.virusbulletin.com/blog/2008/01/usual-fare-holiday-season/

SQL attack hacks wide range of sites

CA among victims of major attack linking sites to malware.
CA among victims of major attack linking sites to malware. Huge numbers of legitimate websites - perhaps as many as 100,000 according to some reports - fell victim to hackers… https://www.virusbulletin.com/blog/2008/01/sql-attack-hacks-wide-range-sites/

Batch of Dutch MP3 players ships with malware

Worm included as unwanted extra for music lovers.
Worm included as unwanted extra for music lovers. A shipment of MP3 players sold in recent months by Dutch firm Victory has been found to be infected with the Fujacks worm, which… https://www.virusbulletin.com/blog/2008/01/batch-dutch-mp3-players-ships-malware/

FTC notes malicious spam on the rise

FTC reports on a decade of spam fighting.
FTC reports on a decade of spam fighting. The US Federal Trade Commission (FTC) has released a report reflecting on the ten years in which it has been involved in the fight… https://www.virusbulletin.com/blog/2008/01/ftc-notes-malicious-spam-rise/

All in the name

Grisoft becomes AVG.
Grisoft becomes AVG. Last month, Czech firm Grisoft, developer of widely used anti-malware product AVG, changed its corporate name to AVG Technologies CZ, s.r.o. Having operated… https://www.virusbulletin.com/blog/2008/01/all-name/

No taste for spam?

ICANN takes steps to combat domain tasting.
ICANN takes steps to combat domain tasting. The practice of domain tasting, often used by spammers and other shady types to register tens of thousands of Internet domain names at… https://www.virusbulletin.com/blog/2008/01/no-taste-spam/

Prolific spammer indicted

Notorious spammer Alan Ralsky charged with spamming and stock fraud.
Notorious spammer Alan Ralsky charged with spamming and stock fraud. Infamous prolific spammer Alan Ralsky has been indicted over his alleged involvement in an international… https://www.virusbulletin.com/blog/2008/01/prolific-spammer-indicted/

2008

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsMS to release out-of-band patch for critical IE vulnerabilityUsers advised to patch ASAP. 17 December 2008IE zero-day danger growingLarge numbers of users vulnerable to… https://www.virusbulletin.com/blog/2008/

Spammers and scammers in court

Spammers required to pay $200,000; 419 scammers face prison sentence.
Spammers required to pay $200,000; 419 scammers face prison sentence. The US Federal Trade Commission (FTC) has settled a court case with a spamming advertising company.… https://www.virusbulletin.com/blog/2008/01/spammers-and-scammers-court/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.