VB Blog

VB2016 video: Last-minute paper: Malicious proxy auto-configs: an easy way to harvest banking credentials

Posted by   Martijn Grooten on   May 30, 2017

In a VB2016 last-minute presentation, Jaromír Horejší and Jan Širmer looked at Retefe, a trojan that has targeted banks in several European countries and used malicious proxy auto-config filesto redirect users' traffic to a server controlled by the attackers. A recording of their presentation is now available to view on our YouTube channel.

Read more  

WannaCry shows we need to understand why organizations don't patch

Posted by   Martijn Grooten on   May 17, 2017

Perhaps the question we should be asking about WannaCry is not "why do so many organizations allow unpatched machines to exist on their networks?" but "why doesn't patching work reasonably well most of the time?"

Read more  

Modern security software is not necessarily powerless against threats like WannaCry

Posted by   Martijn Grooten on   May 15, 2017

The WannaCry ransomware has affected many organisations around the world, making it probably the worst and most damaging of its kind. But modern security is not necessarily powerless against such threats.

Read more  

Throwback Thursday: CARO: A personal view

Posted by   Helen Martin on   May 11, 2017

This week sees the 11th International CARO Workshop taking place in Krakow, Poland – a prestigious annual meeting of anti-malware and security experts. As a founding member of CARO, Fridrik Skulason was well placed, in August 1994, to shed some light on the organization, to explain in detail CARO's main activities and functions, as well as the reasons behind its strict membership regulations.

Read more  

VB2016 paper: Uncovering the secrets of malvertising

Posted by   Martijn Grooten on   May 10, 2017

Malicious advertising, a.k.a. malvertising, has evolved tremendously over the past few years to take a central place in some of today’s largest web-based attacks. It is by far the tool of choice for attackers to reach the masses but also to target them with infinite precision and deliver such payloads as ransomware. Today, we publish a paper presented at VB2016 in Denver by Malwarebytes researchers Jérôme Segura and Chris Boyd, in which they look at the advertising ecosystem, how it is used, and at what techniques are being utilised to spread malware

Read more  

Throwback Thursday: Tools of the DDoS Trade

Posted by   Helen Martin on   May 4, 2017

As DDoS attacks become costlier to fix and continue to increase in both number and diversity, we turn back the clock to 2000, when Aleksander Czarnowski took a look at the DDoS tools of the day.

Read more  

VB2016 paper: Building a local passiveDNS capability for malware incident response

Posted by   Martijn Grooten on   May 4, 2017

At VB2016, Splunk researchers Kathy Wang and Steve Brant presented a Splunk app that can be used to locally collect passive DNS data. A recording of their presentation is now available to view on our YouTube channel.

Read more  

VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle

Posted by   Martijn Grooten on   Apr 28, 2017

In a VB2016 last-minute presentation, ESET researchers Peter Kalnai and Martin Jirkal looked at the OS X malware threats KeRanger and Keydnap, that both spread through a compromised BitTorrent client. A recording of their presentation is now available to view on our YouTube channel.

Read more  

Consumer spyware: a serious threat with a different threat model

Posted by   Martijn Grooten on   Apr 25, 2017

Consumer spyware is a growing issue and one that can have serious consequences: its use is increasingly common in domestic violence. But do our threat models consider the attacker with physical access to, and inside knowledge of the victim?

Read more  

VB2016 paper: Debugging and monitoring malware network activities with Haka

Posted by   Martijn Grooten on   Apr 24, 2017

In their VB2016 paper, Stormshield researchers Benoît Ancel and Mehdi Talbi introduced Haka, an open-source language to monitor, debug and control malicious network traffic. Both their paper and the video recording of their presentation are now available to read/view on www.virusbulletin.com.

Read more  

Search blog

Spamhaus fined $11.7 million for blocking spam

US judgement meaningless, says UK anti-spam project.
US judgement meaningless, says UK anti-spam project. An Illinois court has passed a judgement demanding UK-based spam advisory organisation Spamhaus pay $11.7 million in damages to… https://www.virusbulletin.com/blog/2006/09/spamhaus-fined-11-7-million-blocking-spam/

Vulnerability reported in IE

ActiveX flaw opens another hole in MS browser.
ActiveX flaw opens another hole in MS browser. Yet another bug has been found in Microsoft's browser Internet Explorer, only days after a previous problem was patched for the third… https://www.virusbulletin.com/blog/2006/09/vulnerability-reported-ie/

Symantec hit by vulnerabilities

Two flaws in alert handling unveiled.
Two flaws in alert handling unveiled. Two separate vulnerabilites in the alert notification handling systems of Symantec products have been reported this week. Symantec Client… https://www.virusbulletin.com/blog/2006/09/symantec-hit-vulnerabilities/

Chain letter email reaps addresses

Fake research a harvesting trick by spammers.
Fake research a harvesting trick by spammers. An email widely spammed out in recent days claiming to be part of a research project into email use is in fact a scam designed to… https://www.virusbulletin.com/blog/2006/09/chain-letter-email-reaps-addresses/

ISP wins $11 million from spammers

Judgement in EarthLink lawsuit grants heavy payout.
Judgement in EarthLink lawsuit grants heavy payout. US ISP giant EarthLink, a regular champion of the CAN-SPAM Act, has won yet another case against a spammer. The judgement passed… https://www.virusbulletin.com/blog/2006/09/isp-wins-11-million-spammers/

Sony DRM/AOL combo breaks computers

Anti-spyware tool attacks rootkit, kills CD drive.
Anti-spyware tool attacks rootkit, kills CD drive. An alert has been issued by the Office of the Attorney General of Texas, warning that an anti-spyware product from AOL has a… https://www.virusbulletin.com/blog/2006/09/sony-drm-aol-combo-breaks-computers/

Patch Tuesday light on patches

MS patches previous patches, but not Word exploit.
MS patches previous patches, but not Word exploit.Microsoft's monthly 'Patch Tuesday' release of security fixes has been relatively quiet, with only three new bugs repaired, in… https://www.virusbulletin.com/blog/2006/09/patch-tuesday-light-patches/

Barclays phish spammed widely

64% of recent phishes targeting global brand.
64% of recent phishes targeting global brand. Reports from Panda Software warn of a major phishing campaign targeting users of Barclays online banking, causing a 30% rise in… https://www.virusbulletin.com/blog/2006/09/barclays-phish-spammed-widely/

Star sites host most malware

Celebrities bigger lure than sex, says McAfee.
Celebrities bigger lure than sex, says McAfee. A report on adware and spyware from McAfee has stated that celebrity sites, rather than those pushing pornography or other widely… https://www.virusbulletin.com/blog/2006/09/star-sites-host-most-malware/

Zotob authors jailed

One year, two years for worm writing duo.
One year, two years for worm writing duo. Courts in Morocco have convicted two men accused of having a hand in the creation and distribution of the 'Zotob' worm, which struck… https://www.virusbulletin.com/blog/2006/09/zotob-authors-jailed/

Phishing records broken in July

Highest ever numbers of phishing sites and brands, reports APWG.
Highest ever numbers of phishing sites and brands, reports APWG. 154 brands were recorded as targets for phishing attempts in July, according to the Anti Phishing Working Group… https://www.virusbulletin.com/blog/2006/09/phishing-records-broken-july/

Spearphishers track eBay trades

Auction losers tempted by second-chance phishes.
Auction losers tempted by second-chance phishes. As part of the general trend of more focused phishing, users of online auction house eBay are reporting phishes directly targeting… https://www.virusbulletin.com/blog/2006/09/spearphishers-track-ebay-trades/

Fake news site carries trojan

Conspiracy warning spam points to exploit web page.
Conspiracy warning spam points to exploit web page. A spam campaign is directing Australian readers to a faked news site designed to drop a trojan. The initial mails carry a stark… https://www.virusbulletin.com/blog/2006/09/fake-news-site-carries-trojan/

Botnet keepers rake in adware cash

Zombie herder makes $430 per day from single piece of adware.
Zombie herder makes $430 per day from single piece of adware. According to research by the German Honeynet Project, a botnet controller who installed adware including DollarRevenue… https://www.virusbulletin.com/blog/2006/09/botnet-keepers-rake-adware-cash/

More AV products suffer flaws

Vulnerabilities found in AntiVir and avast!.
Vulnerabilities found in AntiVir and avast!. Security defects in two anti-virus products have been reported by security watch company Secunia in the last week. While the AntiVir… https://www.virusbulletin.com/blog/2006/09/more-av-products-suffer-flaws/

Samsung site hosting malware

Websense reports trojans found on electronics giant's servers.
Websense reports trojans found on electronics giant's servers. A US-hosted website belonging to Samsung Telecommunications America, a subsidiary of South Korean electronics giant… https://www.virusbulletin.com/blog/2006/09/samsung-site-hosting-malware/

Zango not guilty on spyware charges

Spyware bad, adware OK, says court.
Spyware bad, adware OK, says court. Adware-supported 'online media company' Zango has had accusations of using spyware dashed by a Chicago, Illinois court. The class action case,… https://www.virusbulletin.com/blog/2006/09/zango-not-guilty-spyware-charges/

Phishers cast nets less wide

More scams hitting fewer targets, says report.
More scams hitting fewer targets, says report. According to RSA Security's August report on online fraud, the number of brands attacked by phishing scams fell by 20% last month,… https://www.virusbulletin.com/blog/2006/09/phishers-cast-nets-less-wide/

Spyware firms charged $2 million

FTC takes cash, bans from future naughtiness.
FTC takes cash, bans from future naughtiness.Enternet Media and ConSpy & Co., the companies behind products including Miracle Search and EliteBar, have been forced to pay out over… https://www.virusbulletin.com/blog/2006/09/spyware-firms-charged-2-million/

'Magic Quadrant' study unveiled

AV industry future revealed - must do better.
AV industry future revealed - must do better. Industry analyst and predictor Gartner has released its annual 'Magic Quadrant' study of the current state and likely future of the AV… https://www.virusbulletin.com/blog/2006/09/magic-quadrant-study-unveiled/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.