VB Blog

Malicious CCleaner update points to a major weakness in our infrastructure

Posted by   Martijn Grooten on   Sep 18, 2017

Researchers from Cisco Talos have found that a recent version of the widely used CCleaner tool installed malware on the machine.

Read more  

Despite the profitability of ransomware there is a good reason why mining malware is thriving

Posted by   Virus Bulletin on   Sep 15, 2017

Though ransomware is far more profitable than using a compromised PC to mine bitcoins, the global distribution of malware means that there are many botnets for which mining is the most efficient way to extract money out of a PC.

Read more  

VB2017 preview: Crypton - exposing malware's deepest secrets

Posted by   Martijn Grooten on   Sep 14, 2017

We preview the VB2017 paper by Julia Karpin and Anna Dorfman (F5 networks), in which they present a tool to decrypt encrypted parts of malware.

Read more  

VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats

Posted by   Martijn Grooten on   Sep 13, 2017

We preview the VB2017 paper by Marco Romagna and Niek Jan van den Hout (The Hague University of Applied Sciences), in which they thoroughly analyse the motivations and modus operandy of hacktivists.

Read more  

Three questions to ask about security product bypasses

Posted by   Martijn Grooten on   Sep 13, 2017

Proof-of-concepts for bypasses of security products always sound scary, but how seriously should we take them? VB Editor Martijn Grooten lists three questions one should ask about any such bypass to determine how serious a threat it represents.

Read more  

VB2017: WHOIS and EICAR Small Talks added

Posted by   Martijn Grooten on   Sep 12, 2017

Today, we announce two more 'Small Talks' for the VB2017 programme. In one of them, Neil Schwarzman will discuss the consequences of the GDPR for WHOIS and abuse research, while the other will be hosted by three members of EICAR, who will discuss its work on a trustworthiness strategy and minimum standard.

Read more  

VB2017: nine last-minute papers announced

Posted by   Martijn Grooten on   Sep 11, 2017

From attacks on Ukraine's power grid to web shells, and from car hacking to ransomware: we announce the first nine 'last-minute' papers on the VB2017 programme.

Read more  

Patching is important even when it only shows the maturity of your security process

Posted by   Martijn Grooten on   Sep 5, 2017

A lot of vulnerabilities that are discovered are never exploited in the wild. It is still important to patch them though.

Read more  

Massive data breach confirms what you already knew: you are getting spam

Posted by   Martijn Grooten on   Sep 4, 2017

A security researcher found more than 700 million email addresses stored on a server used by a spam botnet, which gives us some insight into what the email lists used by spammers look like.

Read more  

VB2017 preview: State of cybersecurity in Africa: Kenya

Posted by   Martijn Grooten on   Sep 4, 2017

We preview the VB2017 presentation by Tyrus Kamau (Euclid Security), who will talk about the state of cybersecurity in Africa, with a particular focus on his home country, Kenya.

Read more  

Search blog

Vulnerability reported in IE

ActiveX flaw opens another hole in MS browser.
ActiveX flaw opens another hole in MS browser. Yet another bug has been found in Microsoft's browser Internet Explorer, only days after a previous problem was patched for the third… https://www.virusbulletin.com/blog/2006/09/vulnerability-reported-ie/

Symantec hit by vulnerabilities

Two flaws in alert handling unveiled.
Two flaws in alert handling unveiled. Two separate vulnerabilites in the alert notification handling systems of Symantec products have been reported this week. Symantec Client… https://www.virusbulletin.com/blog/2006/09/symantec-hit-vulnerabilities/

Chain letter email reaps addresses

Fake research a harvesting trick by spammers.
Fake research a harvesting trick by spammers. An email widely spammed out in recent days claiming to be part of a research project into email use is in fact a scam designed to… https://www.virusbulletin.com/blog/2006/09/chain-letter-email-reaps-addresses/

Spamhaus fined $11.7 million for blocking spam

US judgement meaningless, says UK anti-spam project.
US judgement meaningless, says UK anti-spam project. An Illinois court has passed a judgement demanding UK-based spam advisory organisation Spamhaus pay $11.7 million in damages to… https://www.virusbulletin.com/blog/2006/09/spamhaus-fined-11-7-million-blocking-spam/

ISP wins $11 million from spammers

Judgement in EarthLink lawsuit grants heavy payout.
Judgement in EarthLink lawsuit grants heavy payout. US ISP giant EarthLink, a regular champion of the CAN-SPAM Act, has won yet another case against a spammer. The judgement passed… https://www.virusbulletin.com/blog/2006/09/isp-wins-11-million-spammers/

Sony DRM/AOL combo breaks computers

Anti-spyware tool attacks rootkit, kills CD drive.
Anti-spyware tool attacks rootkit, kills CD drive. An alert has been issued by the Office of the Attorney General of Texas, warning that an anti-spyware product from AOL has a… https://www.virusbulletin.com/blog/2006/09/sony-drm-aol-combo-breaks-computers/

Patch Tuesday light on patches

MS patches previous patches, but not Word exploit.
MS patches previous patches, but not Word exploit.Microsoft's monthly 'Patch Tuesday' release of security fixes has been relatively quiet, with only three new bugs repaired, in… https://www.virusbulletin.com/blog/2006/09/patch-tuesday-light-patches/

Barclays phish spammed widely

64% of recent phishes targeting global brand.
64% of recent phishes targeting global brand. Reports from Panda Software warn of a major phishing campaign targeting users of Barclays online banking, causing a 30% rise in… https://www.virusbulletin.com/blog/2006/09/barclays-phish-spammed-widely/

Star sites host most malware

Celebrities bigger lure than sex, says McAfee.
Celebrities bigger lure than sex, says McAfee. A report on adware and spyware from McAfee has stated that celebrity sites, rather than those pushing pornography or other widely… https://www.virusbulletin.com/blog/2006/09/star-sites-host-most-malware/

Zotob authors jailed

One year, two years for worm writing duo.
One year, two years for worm writing duo. Courts in Morocco have convicted two men accused of having a hand in the creation and distribution of the 'Zotob' worm, which struck… https://www.virusbulletin.com/blog/2006/09/zotob-authors-jailed/

Fake news site carries trojan

Conspiracy warning spam points to exploit web page.
Conspiracy warning spam points to exploit web page. A spam campaign is directing Australian readers to a faked news site designed to drop a trojan. The initial mails carry a stark… https://www.virusbulletin.com/blog/2006/09/fake-news-site-carries-trojan/

Phishing records broken in July

Highest ever numbers of phishing sites and brands, reports APWG.
Highest ever numbers of phishing sites and brands, reports APWG. 154 brands were recorded as targets for phishing attempts in July, according to the Anti Phishing Working Group… https://www.virusbulletin.com/blog/2006/09/phishing-records-broken-july/

Spearphishers track eBay trades

Auction losers tempted by second-chance phishes.
Auction losers tempted by second-chance phishes. As part of the general trend of more focused phishing, users of online auction house eBay are reporting phishes directly targeting… https://www.virusbulletin.com/blog/2006/09/spearphishers-track-ebay-trades/

Botnet keepers rake in adware cash

Zombie herder makes $430 per day from single piece of adware.
Zombie herder makes $430 per day from single piece of adware. According to research by the German Honeynet Project, a botnet controller who installed adware including DollarRevenue… https://www.virusbulletin.com/blog/2006/09/botnet-keepers-rake-adware-cash/

More AV products suffer flaws

Vulnerabilities found in AntiVir and avast!.
Vulnerabilities found in AntiVir and avast!. Security defects in two anti-virus products have been reported by security watch company Secunia in the last week. While the AntiVir… https://www.virusbulletin.com/blog/2006/09/more-av-products-suffer-flaws/

Samsung site hosting malware

Websense reports trojans found on electronics giant's servers.
Websense reports trojans found on electronics giant's servers. A US-hosted website belonging to Samsung Telecommunications America, a subsidiary of South Korean electronics giant… https://www.virusbulletin.com/blog/2006/09/samsung-site-hosting-malware/

Zango not guilty on spyware charges

Spyware bad, adware OK, says court.
Spyware bad, adware OK, says court. Adware-supported 'online media company' Zango has had accusations of using spyware dashed by a Chicago, Illinois court. The class action case,… https://www.virusbulletin.com/blog/2006/09/zango-not-guilty-spyware-charges/

Phishers cast nets less wide

More scams hitting fewer targets, says report.
More scams hitting fewer targets, says report. According to RSA Security's August report on online fraud, the number of brands attacked by phishing scams fell by 20% last month,… https://www.virusbulletin.com/blog/2006/09/phishers-cast-nets-less-wide/

'Magic Quadrant' study unveiled

AV industry future revealed - must do better.
AV industry future revealed - must do better. Industry analyst and predictor Gartner has released its annual 'Magic Quadrant' study of the current state and likely future of the AV… https://www.virusbulletin.com/blog/2006/09/magic-quadrant-study-unveiled/

MS sues UK spammer

Civil action avoids spam law technicalities.
Civil action avoids spam law technicalities.Microsoft has sued and reached an out-of-court settlement with UK spammer Paul Fox, after apparently despairing of finding any success… https://www.virusbulletin.com/blog/2006/09/ms-sues-uk-spammer/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.