VB Blog

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

Posted by   Martijn Grooten on   Nov 22, 2019

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his presentation.

Read more  

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Posted by   Martijn Grooten on   Nov 21, 2019

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution and the affiliate scheme behind it. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Domestic Kitten: an Iranian surveillance program

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video of their presentation.

Read more  

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

Read more  

VB2019 paper: DNS on fire

Posted by   Martijn Grooten on   Nov 7, 2019

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

Read more  

German Dridex spam campaign is unfashionably large

Posted by   Martijn Grooten on   Nov 6, 2019

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Read more  

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

Posted by   Martijn Grooten on   Nov 5, 2019

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

Read more  

Emotet continues to bypass many email security products

Posted by   Martijn Grooten on   Nov 4, 2019

Having returned from a summer hiatus, Emotet is back targeting inboxes and, as seen in the VBSpam test lab, doing a better job than most other malicious campaigns at bypassing email security products.

Read more  

VB2019 paper: We need to talk - opening a discussion about ethics in infosec

Posted by   Martijn Grooten on   Nov 1, 2019

Those working in the field of infosec are often faced with ethical dilemmas that are impossible to avoid. Today, we publish a VB2019 paper by Kaspersky researcher Ivan Kwiatkowski looking at ethics in infosec as well as the recording of Ivan's presentation.

Read more  

Stalkerware poses particular challenges to anti-virus products

Posted by   Martijn Grooten on   Oct 31, 2019

Malware used in domestic abuse situations is a growing threat, and the standard way for anti-virus products to handle such malware may not be good enough. But that doesn't mean there isn't an important role for anti-virus to play.

Read more  

Search blog

Virus writers continue targeting Microsoft's latest ideas

Another piece of malware for MS Powershell.
Another piece of malware for MS Powershell. Another piece of malware for Microsoft's Powershell is making the news. The script virus exploits the new command shell, formerly known… https://www.virusbulletin.com/blog/2006/08/virus-writers-continue-targeting-microsoft-s-latest-ideas/

Apple releases patches - Mac debate rumbles on

Are Macs safer than Windows PCs? Oh yes they are... Oh no they're not.. etc.
Are Macs safer than Windows PCs? Oh yes they are... Oh no they're not.. etc. Spokespeople for various AV companies continue to add to the 'are Macs safer?' debate kicked off last… https://www.virusbulletin.com/blog/2006/08/apple-releases-patches-mac-debate-rumbles/

Supermarket scammed by hacker employees

Supermarket sweep.
Supermarket sweep. In a plot mirroring the Mike Judge comedy Office Space, a team of supermarket employees in Manama created trojan software to tweak company databases and steal… https://www.virusbulletin.com/blog/2006/08/supermarket-scammed-hacker-employees/

Rain of phish hits UK

Single botnet responsible for 8 million phishing emails.
Single botnet responsible for 8 million phishing emails. A single botnet has unleashed over 8 million phishing emails on UK targets over the last few days, according to mail… https://www.virusbulletin.com/blog/2006/08/rain-phish-hits-uk/

Hi-tech phreaking and other VoIP woes

Security issues with VoIP technology revealed at Black Hat USA.
Security issues with VoIP technology revealed at Black Hat USA. Security issues with VoIP technology, allowing hackers to access corporate services and sell them on, as well as… https://www.virusbulletin.com/blog/2006/08/hi-tech-phreaking-and-other-voip-woes/

F-Secure announces healthy figures

Finnish AV firm shows strong performance.
Finnish AV firm shows strong performance.F-Secure's latest financial announcement reports a 35% growth in revenues, and an 88% growth in operating profits. The success is put down… https://www.virusbulletin.com/blog/2006/08/f-secure-announces-healthy-figures/

Symantec, McAfee suffer bugs

Norton and VirusScan afflicted.
Norton and VirusScan afflicted.Symantec has issued details of a minor bug in its Norton AV software - a recent update left some users seeing confusing messages claiming the… https://www.virusbulletin.com/blog/2006/08/symantec-mcafee-suffer-bugs/

Interpol site spoofed

Beware fake international police organizations...
Beware fake international police organizations... Practitioners of ur-phish, the 419 scam, have set up a doctored mirror of Interpol's website, as a ruse to ease victims' worries… https://www.virusbulletin.com/blog/2006/08/interpol-site-spoofed/

BBC hypes 'more than 95% spam rate'

Shock figure drawn from dubious source.
Shock figure drawn from dubious source. The BBC online news website has published an article under the headline 'More than 95% of e-mail is "junk"'. The report, which was linked… https://www.virusbulletin.com/blog/2006/08/bbc-hypes-more-95-spam-rate/

Security products scoop sales top ten

Strong sales for security products in June.
Strong sales for security products in June. A hefty seven of the top 10 software products sold over the counter in June were security-related, according to sales tracking… https://www.virusbulletin.com/blog/2006/08/security-products-scoop-sales-top-ten/

Market consolidation

Mergers in the anti-spam market.
Mergers in the anti-spam market. Anti-spam and messaging security company CipherTrust announced last month that it is to be acquired by Secure Computing.CipherTrust - which… https://www.virusbulletin.com/blog/2006/08/market-consolidation/

Anti-phishing best practices

Anti-phishing recommendations for ISPs and mailbox providers.
Anti-phishing recommendations for ISPs and mailbox providers. A new set of best practices to combat phishing has been released by the Anti-Phishing Working Group (APWG) and… https://www.virusbulletin.com/blog/2006/08/anti-phishing-best-practices/

Linux magazine prints rootkit how-to

Arming sys admins with all they need to know to write a rootkit...
Arming sys admins with all they need to know to write a rootkit... Imaginatively named magazine for Linux users Linux Magazine has published an article entitled 'How to write a… https://www.virusbulletin.com/blog/2006/08/linux-magazine-prints-rootkit-how/

New and revised laws

New anti-spam laws prepared and old ones revisited.
New anti-spam laws prepared and old ones revisited. One of the world's top spam-sending hot spots is currently preparing for the launch of its first anti-spam laws. Together with… https://www.virusbulletin.com/blog/2006/08/new-and-revised-laws/

August issue of VB published

The August issue of Virus Bulletin is now available for subscribers to download.
The August issue of Virus Bulletin is now available for subscribers to download. The August 2006 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2006/08/august-issue-vb-published/

August

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/08/

Supply of data to spammers stopped

Database thief charged.
Database thief charged. A US man has been charged with stealing a database of US physicians with the intention of selling it on to spammers. Forty-six-year-old William Bailey, Jr… https://www.virusbulletin.com/blog/2006/08/supply-data-spammers-stopped/

More on the XP comparative

Setting the record straight.
Setting the record straight. In VB's June 2006 comparative review it was reported that the Norman product behaved badly, with repeated crashes on dealing with infected or… https://www.virusbulletin.com/blog/2006/08/more-xp-comparative/

Sysinternals goes the Microsoft way

Microsoft acquires company behind the Sysinternals range of freeware tools.
Microsoft acquires company behind the Sysinternals range of freeware tools.Microsoft announced the acquisition last month of privately held Winternals Software LP - the company… https://www.virusbulletin.com/blog/2006/08/sysinternals-goes-microsoft-way/

Phone phishes

Watch out for fake SMS messages.
Watch out for fake SMS messages. A sneaky new phishing technique emerged last month, in which initial contact is made with victims via SMS text message. In the attack, an SMS… https://www.virusbulletin.com/blog/2006/07/phone-phishes/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.