VB Blog

Paper: New Keylogger on the Block

Posted by   Martijn Grooten on   Jul 5, 2016

In a new paper published by Virus Bulletin, Sophos researcher Gabor Szappanos takes a look at the KeyBase keylogger, sold as a commercial product and popular among cybercriminals who use it in Office exploit kits.

Read more  

BSides Denver to take place the day after VB2016

Posted by   Martijn Grooten on   Jun 28, 2016

VB2016, the 26th International Virus Bulletin conference, is an excellent reason to go to Denver, Colorado in the first week of October. But there is another reason to come to Denver: BSides Denver, which will take place the day after VB2016, on Saturday 8 October 2016.

Read more  

VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format

Posted by   Virus Bulletin on   Jun 13, 2016

In their VB2015 paper, Peter Kálnai and Jaromír Hořejší look at the current state of DDoS trojans forming covert botnets on unsuspecting systems. The paper provides a technical analysis of the most important malware families, focusing on infection methods, dynamic behaviour, C&C communication, obfuscation techniques, advanced methods of persistence and stealth, and elimination of rivals.

Read more  

Throwback Thursday: Hyppönen, that Data Fellow / Finnish Sprayer

Posted by   Helen Martin on   Jun 2, 2016

This week, well known and universally respected industry guru Mikko Hyppönen celebrates his 25th anniversary of working at F-Secure (formerly known as Data Fellows). VB takes a look back in the archives at two articles published in 1994: an "insight" into the life and work of the then rising star of the anti-virus world, and a virus analysis penned by the man himself.

Read more  

VB2015 paper: Economic Sanctions on Malware

Posted by   Helen Martin on   Jun 1, 2016

Financial pressure can be a proactive and potentially very effective tool in making our computer ecosystems safer. By cleverly employing various trust metrics and technologies such as digital signing, watermarking, and public-key infrastructure in strategically selected places, we can encourage good behaviours and punish bad ones. In his VB2015 paper, Igor Muttik analyses and gives examples of technologies (certificates, credentials, etc.) to de-incentivize bad behaviours in several ecosystems (Windows, Android, iOS).

Read more  

Virus Bulletin's job site for recruiters and job seekers

Posted by   Martijn Grooten on   May 26, 2016

Virus Bulletin has relaunched its security job vacancy service and added a new section, in which job seekers can advertise their skills and experience.

Read more  

Throwback Thursday: One_Half: The Lieutenant Commander?

Posted by   Helen Martin on   May 26, 2016

In October 1994, a new multi-partite virus appeared, using some of the techniques developed by the Dark Avenger in Commander_Bomber. As if this were not enough, the One_Half virus could also encrypt vital parts of the fixed disk. Eugene Kaspersky provided a detailed analysis.

Read more  

Advertisements on Blogspot sites lead to support scam

Posted by   Martijn Grooten on   May 9, 2016

Support scam pop-ups presented through malicious advertisements show that, next to vulnerable end points, gullible users remain an easy source of money for online criminals.

Read more  

To make Tor work better on the web, we need to be honest about it

Posted by   Martijn Grooten on   May 6, 2016

Many websites put barriers in front of visitors who use the Tor network. If we want to make the web more accessible through Tor, we need to be honest about why this is done, rather than cry wolf about a dislike for privacy, Martijn Grooten says.

Read more  

Paper: How It Works: Steganography Hides Malware in Image Files

Posted by   Martijn Grooten on   Apr 28, 2016

A new paper by CYREN researcher Lordian Mosuela takes a close look at Gatak, or Stegoloader, a piece of malware that was discovered last year and that is controlled via malicious code embedded in a PNG image, a technique known as steganography.

Read more  

Search blog

VB2019 preview: A study of Machete cyber espionage operations in Latin America

Researchers from the Czech Technical University in Prague will present a very comprehensive overview of the Machete APT group.
The US government considers China, Russia, Iran and North Korea to be the most prominent nation-state actors in cyber space. Apart from conveniently ignoring activities by the US… https://www.virusbulletin.com/blog/2019/08/vb2019-preview-study-machete-cyber-espionage-operations-latin-america/

AfricaHackon 2019: a great event and a reminder that security is global

Last week, VB Editor Martijn Grooten travelled to the Kenyan capital Nairobi to speak at the 6th edition of the AfricaHackon event.
It was a few years ago that I first learned of AfricaHackon, Africa's premier IT security conference. It led me to invite Tyrus Kamau, one of the event's organisers, to speak at… https://www.virusbulletin.com/blog/2019/08/africahackon-2019-reminder-security-global/

Virus Bulletin researcher discovers new Lord exploit kit

Still in-development kit thus far only targets Flash Player vulnerabilities
The number of active exploit kits is very small: the recently published summer 2019 edition of Malwarebytes' quarterly round-up lists the seven then known active exploit kits. To… https://www.virusbulletin.com/blog/2019/08/virus-bulletin-researcher-discovers-new-lord-exploit-kit/

VB2019 call for last-minute papers opened

The call for last-minute papers for VB2019 is now open. Submit before 1 September to have your abstract considered for one of the nine slots reserved for 'hot' research.
Virus Bulletin has opened the call for last-minute papers for VB2019.  The VB2019 programme already boasts some 40 talks that were announced more than three months ago. Though… https://www.virusbulletin.com/blog/2019/07/vb2019-call-last-minute-papers-opened/

Nominations opened for sixth Péter Szőr Award

Virus Bulletin is seeking nominations for the sixth annual Péter Szőr Award.
Virus Bulletin is seeking nominations for the sixth annual Péter Szőr Award. The award was inaugurated during the VB2014 conference, in honour of late security researcher and… https://www.virusbulletin.com/blog/2019/07/nominations-opened-sixth-peter-szor-award/

Haroon Meer and Adrian Sanabria to deliver VB2019 closing keynote

New additions to the VB2019 conference programme include a closing keynote address from Thinkst duo Haroon Meer and Adrian Sanabria and a talk on attacks against payment systems.
We are very excited to announce that the closing keynote for VB2019 will be delivered by Haroon Meer and Adrian Sanabria of Thinkst, the company that was founded by Haroon and… https://www.virusbulletin.com/blog/2019/06/haroon-meer-and-adrian-sanabria-deliver-vb2019-closing-keynote/

Free VB2019 tickets for students

Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android, we are able to offer 20 free tickets to students who want to attend VB2019.
Update 02 August 2019: Applications for free student tickets have now closed. Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android, we… https://www.virusbulletin.com/blog/2019/06/free-vb2019-tickets-students/

VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups seen in recent years. At VB2018 ESET researchers Peter Kálnai and Michal Poslušný presented a paper looking at the group's various campaigns. To…
Lazarus Group: a mahjong game played with different sets of tiles Read the paper (HTML) Download the paper (PDF)       At VB2019 in London, Peter and Michal will… https://www.virusbulletin.com/blog/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/

Book your VB2019 ticket now for a chance to win a ticket for BSides London

Virus Bulletin is proud to sponsor this year's BSides London conference, which will take place next week, and we have a number of tickets to give away.
At Virus Bulletin, we have a particular fondness for the BSides community events, half a dozen of which we have attended in various locations around the world. And because our own… https://www.virusbulletin.com/blog/2019/05/book-your-vb2019-ticket-now-chance-win-ticket-bsides-london/

First 11 partners of VB2019 announced

We are excited to announce the first 11 companies to partner with VB2019, whose support will help ensure a great event.
The Virus Bulletin Conference is all about bringing the security community together to share intelligence and move the industry forward, but we wouldn't be able to do any of this… https://www.virusbulletin.com/blog/2019/05/first-11-vb2019-partners-announced/

Paper: Alternative communication channel over NTP

In a new paper published today, independent researcher Nikolaos Tsapakis writes about the possibilities of malware using NTP as a covert communication channel and how to stop this.
Alternative communication channel over NTP Read the paper (HTML) Download the paper (PDF)   The use of DNS as a covert C&C communication channel has been widely documented… https://www.virusbulletin.com/blog/2019/04/paper-alternative-communication-channel-over-ntp/

VB2019 conference programme announced

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.
We are excited to announce the programme for VB2019, the 29th International Virus Bulletin Conference which will take place 2-4 October in London, UK. The conference… https://www.virusbulletin.com/blog/2019/04/vb2019-conference-programme-announced/

VB2018 paper: Under the hood - the automotive challenge

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the challenges ahe…
Under the hood - the automotive challenge Read the paper (HTML) Download the paper (PDF)     During last week's Pwn2Own 2019 hacking contest, a Senegalese-Chinese duo… https://www.virusbulletin.com/blog/2019/03/vb2018-paper-under-hood-automotive-challenge/

VB2018 paper: Fake News, Inc.

A former reporter by profession, Andrew Brandt's curiosity was piqued when he came across what appeared at first glance to be the website of a small-town newspaper based in Illinois, but under scrutiny, things didn’t add up. At VB2018 he presented a paper…
    Andrew Brandt will also speak at VB2019 in London. This time, in a Small Talk session, he will share his experience of analysing "retromalware" – some of the oldest… https://www.virusbulletin.com/blog/2019/04/vb2018-paper-fake-news-inc/

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that combin…
Android app deobfuscation using static-dynamic cooperation Read the paper (HTML) Download the paper (PDF)   The two most common methods for analysing potentially malicious… https://www.virusbulletin.com/blog/2019/03/vb2018-paper-and-video-android-app-deobfuscation-using-static-dynamic-cooperation/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.