VB Blog

VB2018 paper: Fake News, Inc.

Posted by   Helen Martin on   Apr 25, 2019

A former reporter by profession, Andrew Brandt's curiosity was piqued when he came across what appeared at first glance to be the website of a small-town newspaper based in Illinois, but under scrutiny, things didn’t add up. At VB2018 he presented a paper in which he shared the results of his investigation of the site. Today, we publish his paper and the recording of his presentation.

Read more  

Paper: Alternative communication channel over NTP

Posted by   Martijn Grooten on   Apr 24, 2019

In a new paper published today, independent researcher Nikolaos Tsapakis writes about the possibilities of malware using NTP as a covert communication channel and how to stop this.

Read more  

VB2019 conference programme announced

Posted by   Martijn Grooten on   Apr 5, 2019

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.

Read more  

VB2018 paper: Under the hood - the automotive challenge

Posted by   Martijn Grooten on   Mar 27, 2019

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the challenges ahead. Today, we publish both Inbar's paper and the recording of his presentation.

Read more  

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Posted by   Martijn Grooten on   Mar 20, 2019

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that combines static and dynamic analysis to defeat app obfuscation in Android binaries. We also publish the video of their presentation.

Read more  

VB2019 call for papers closes this weekend

Posted by   Martijn Grooten on   Mar 15, 2019

The call for papers for VB2019 closes on 17 March, and while we've already received many great submissions, we still want more!

Read more  

Registration open for VB2019 ─ book your ticket now!

Posted by   Martijn Grooten on   Mar 13, 2019

Registration for VB2019, the 29th Virus Bulletin International Conference, is now open, with an early bird rate available until 1 July.

Read more  

The VB2019 call for papers is about ... papers

Posted by   Martijn Grooten on   Mar 8, 2019

When we are calling for papers for the Virus Bulletin conference as we are doing now, we really mean a written paper. But don't worry if you've never written a paper - we can help!

Read more  

VB2018 video: Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived

Posted by   Martijn Grooten on   Mar 8, 2019

Amit Serper first analysed the OSX/Pirrit adware in 2016, highlighting some of its malware-like techniques, and soon afterwards started receiving legal threats from the company behind it. At VB2018 Amit gave a presentation in which he discussed both the adware and the legal threats he received for calling it malware. Today, we publish the video of Amit's presentation.

Read more  

VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Mar 5, 2019

In December 2016, the CRASHOVERRIDE malware framework was used to cause a blackout in Ukraine. At VB2018 in Montreal, Dragos researcher Joe Slowik presented a detailed paper on the framework, explaining how the malware works and how it targets various protocols used to operate the electric grid. Today we publish both Joe's paper and the recording of his presentation.

Read more  

Search blog

Virus writers continue targeting Microsoft's latest ideas

Another piece of malware for MS Powershell.
Another piece of malware for MS Powershell. Another piece of malware for Microsoft's Powershell is making the news. The script virus exploits the new command shell, formerly known… https://www.virusbulletin.com/blog/2006/08/virus-writers-continue-targeting-microsoft-s-latest-ideas/

Apple releases patches - Mac debate rumbles on

Are Macs safer than Windows PCs? Oh yes they are... Oh no they're not.. etc.
Are Macs safer than Windows PCs? Oh yes they are... Oh no they're not.. etc. Spokespeople for various AV companies continue to add to the 'are Macs safer?' debate kicked off last… https://www.virusbulletin.com/blog/2006/08/apple-releases-patches-mac-debate-rumbles/

Supermarket scammed by hacker employees

Supermarket sweep.
Supermarket sweep. In a plot mirroring the Mike Judge comedy Office Space, a team of supermarket employees in Manama created trojan software to tweak company databases and steal… https://www.virusbulletin.com/blog/2006/08/supermarket-scammed-hacker-employees/

Rain of phish hits UK

Single botnet responsible for 8 million phishing emails.
Single botnet responsible for 8 million phishing emails. A single botnet has unleashed over 8 million phishing emails on UK targets over the last few days, according to mail… https://www.virusbulletin.com/blog/2006/08/rain-phish-hits-uk/

Hi-tech phreaking and other VoIP woes

Security issues with VoIP technology revealed at Black Hat USA.
Security issues with VoIP technology revealed at Black Hat USA. Security issues with VoIP technology, allowing hackers to access corporate services and sell them on, as well as… https://www.virusbulletin.com/blog/2006/08/hi-tech-phreaking-and-other-voip-woes/

F-Secure announces healthy figures

Finnish AV firm shows strong performance.
Finnish AV firm shows strong performance.F-Secure's latest financial announcement reports a 35% growth in revenues, and an 88% growth in operating profits. The success is put down… https://www.virusbulletin.com/blog/2006/08/f-secure-announces-healthy-figures/

Symantec, McAfee suffer bugs

Norton and VirusScan afflicted.
Norton and VirusScan afflicted.Symantec has issued details of a minor bug in its Norton AV software - a recent update left some users seeing confusing messages claiming the… https://www.virusbulletin.com/blog/2006/08/symantec-mcafee-suffer-bugs/

Interpol site spoofed

Beware fake international police organizations...
Beware fake international police organizations... Practitioners of ur-phish, the 419 scam, have set up a doctored mirror of Interpol's website, as a ruse to ease victims' worries… https://www.virusbulletin.com/blog/2006/08/interpol-site-spoofed/

BBC hypes 'more than 95% spam rate'

Shock figure drawn from dubious source.
Shock figure drawn from dubious source. The BBC online news website has published an article under the headline 'More than 95% of e-mail is "junk"'. The report, which was linked… https://www.virusbulletin.com/blog/2006/08/bbc-hypes-more-95-spam-rate/

Security products scoop sales top ten

Strong sales for security products in June.
Strong sales for security products in June. A hefty seven of the top 10 software products sold over the counter in June were security-related, according to sales tracking… https://www.virusbulletin.com/blog/2006/08/security-products-scoop-sales-top-ten/

Market consolidation

Mergers in the anti-spam market.
Mergers in the anti-spam market. Anti-spam and messaging security company CipherTrust announced last month that it is to be acquired by Secure Computing.CipherTrust - which… https://www.virusbulletin.com/blog/2006/08/market-consolidation/

Anti-phishing best practices

Anti-phishing recommendations for ISPs and mailbox providers.
Anti-phishing recommendations for ISPs and mailbox providers. A new set of best practices to combat phishing has been released by the Anti-Phishing Working Group (APWG) and… https://www.virusbulletin.com/blog/2006/08/anti-phishing-best-practices/

Linux magazine prints rootkit how-to

Arming sys admins with all they need to know to write a rootkit...
Arming sys admins with all they need to know to write a rootkit... Imaginatively named magazine for Linux users Linux Magazine has published an article entitled 'How to write a… https://www.virusbulletin.com/blog/2006/08/linux-magazine-prints-rootkit-how/

New and revised laws

New anti-spam laws prepared and old ones revisited.
New anti-spam laws prepared and old ones revisited. One of the world's top spam-sending hot spots is currently preparing for the launch of its first anti-spam laws. Together with… https://www.virusbulletin.com/blog/2006/08/new-and-revised-laws/

August issue of VB published

The August issue of Virus Bulletin is now available for subscribers to download.
The August issue of Virus Bulletin is now available for subscribers to download. The August 2006 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2006/08/august-issue-vb-published/

August

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/08/

Supply of data to spammers stopped

Database thief charged.
Database thief charged. A US man has been charged with stealing a database of US physicians with the intention of selling it on to spammers. Forty-six-year-old William Bailey, Jr… https://www.virusbulletin.com/blog/2006/08/supply-data-spammers-stopped/

More on the XP comparative

Setting the record straight.
Setting the record straight. In VB's June 2006 comparative review it was reported that the Norman product behaved badly, with repeated crashes on dealing with infected or… https://www.virusbulletin.com/blog/2006/08/more-xp-comparative/

Sysinternals goes the Microsoft way

Microsoft acquires company behind the Sysinternals range of freeware tools.
Microsoft acquires company behind the Sysinternals range of freeware tools.Microsoft announced the acquisition last month of privately held Winternals Software LP - the company… https://www.virusbulletin.com/blog/2006/08/sysinternals-goes-microsoft-way/

Phone phishes

Watch out for fake SMS messages.
Watch out for fake SMS messages. A sneaky new phishing technique emerged last month, in which initial contact is made with victims via SMS text message. In the attack, an SMS… https://www.virusbulletin.com/blog/2006/07/phone-phishes/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.