VB Blog

VB2019 paper: Defeating APT10 compiler-level obfuscations

Posted by   Virus Bulletin on   Mar 13, 2020

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro's paper and the recording of his presentation.

Read more  

VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

Posted by   Virus Bulletin on   Mar 12, 2020

At VB2019 in London Michael Raggi (Proofpoint) and Ghareeb Saad (Anomali) presented a paper on the 'Royal Road' exploit builder (or weaponizer) and how the properties of RTF files can be used to track weaponizers and their users. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 presentation: Nexus between OT and IT threat intelligence

Posted by   Virus Bulletin on   Mar 11, 2020

Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners’ Summit at VB2019, Dragos cyber threat intelligence analyst Selena Larson gave a keynote on these similarities and differences. Today we release the recording of her presentation.

Read more  

VB2019 paper: Kimsuky group: tracking the king of the spear-phishing

Posted by   Virus Bulletin on   Mar 10, 2020

In a paper presented at VB2019 in London, researchers fron the Financial Security Institute detailed the tools and activities used by the APT group 'Kimsuky', some of which they were able to analyse through OpSec failures by the group. Today, we publish their paper.

Read more  

VB2019 paper: Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly

Posted by   Virus Bulletin on   Mar 9, 2020

In a paper presented at VB2019 in London, Trend Micro researchers Lilang Wu and Moony Li explained how the hunt for vulnerabilities in MacOS and iOS operating systems can be made both smarter and more automatic. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Finding drive-by rookies using an automated active observation platform

Posted by   Virus Bulletin on   Mar 6, 2020

In a last-minute paper presented at VB2019 in London, Rintaro Koike (NTT Security) and Yosuke Chubachi (Active Defense Institute, Ltd) discussed the platform they have built to automatically detect and analyse exploit kits. Today we publish the recording of their presentation.

Read more  

VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation state adversary

Posted by   Virus Bulletin on   Feb 28, 2020

The activities of China-based threat actor PKPLUG were detailed in a VB2019 paper by Palo Alto Networks researcher Alex Hinchliffe, who described the playbook of this long-standing adversary. Today we publish both Alex's paper and the recording of his presentation.

Read more  

VB2019 paper: Static analysis methods for detection of Microsoft Office exploits

Posted by   Virus Bulletin on   Feb 25, 2020

Today we publish the VB2019 paper and presentation by McAfee researcher Chintan Shah in which he described static analysis methods for the detection of Microsoft Office exploits.

Read more  

New paper: LokiBot: dissecting the C&C panel deployments

Posted by   Helen Martin on   Feb 17, 2020

First advertised as an information stealer and keylogger when it appeared in underground forums in 2015, LokiBot has added various capabilities over the years and has affected many users worldwide. In a new paper researcher Aditya Sood analyses the URL structure of the LokiBot C&C panels and how they have evolved over time.

Read more  

VB2019 presentation: Building secure sharing systems that treat humans as features not bugs

Posted by   Helen Martin on   Feb 14, 2020

In a presentation at VB2019 in London, Virtru's Andrea Limbago described how, by exploring data sharing challenges through a socio-technical lens, it is possible to make significant gains toward the secure sharing systems and processes that are vital for innovation and collaboration. Today we release the recording of her presentation.

Read more  

Search blog

An end to 419 spam?

Nigerian government takes action.
Nigerian government takes action. Fed up of the stigma that 419 email scammers bring to Nigeria's reputation and keen to build investor confidence in the country, Nigeria's… https://www.virusbulletin.com/blog/2004/01/end-419-spam/

MyDoom, YourDoom, OurDoom

SCO offers a bounty for the arrest of the MyDoom author, Bruce Perens offers a conspiracy theory...
SCO offers a bounty for the arrest of the MyDoom author, Bruce Perens offers a conspiracy theory... SCO is offering a reward for information leading to the arrest of the author… https://www.virusbulletin.com/blog/2004/01/mydoom-yourdoom-ourdoom/

Divine intervention

AV on a spiritual level
AV on a spiritual level We all know how quickly time flies when we're having fun, or when there's a deadline looming, but a recent news report on the Asian news website Channel… https://www.virusbulletin.com/blog/2004/01/divine-intervention/

Waiting, reflecting and removing

Microsoft reports success of Blaster removal tool
Microsoft reports success of Blaster removal tool While young Romanian virus author Dan Dumitru Ciobanu awaited trial by a Romanian court last month for releasing a variant of… https://www.virusbulletin.com/blog/2004/01/waiting-reflecting-and-removing/

News summary...

Blaster (variant) author charged, AhnLab warns against complacency, India launches CERT-In, more on monoculture, and what's new in the spam world...
Blaster (variant) author charged, AhnLab warns against complacency, India launches CERT-In, more on monoculture, and what's new in the spam world... In much the same way that the… https://www.virusbulletin.com/blog/2004/01/news-summary/

Email coaching for marketers

DMA releases quick-glance reference guide for email marketers.
DMA releases quick-glance reference guide for email marketers. The Direct Marketing Association (DMA) has released a quick-glance reference guide for marketers entitled 'The CAN… https://www.virusbulletin.com/blog/2004/01/email-coaching-marketers/

Ahnlab partners with Sina.com

Ahnlab gets major ASP deal in China.
Ahnlab gets major ASP deal in China. Ahnlab has acquired a major stepping-stone into the Chinese domestic market, according to an article published by the Korea Herald, by… https://www.virusbulletin.com/blog/2004/01/ahnlab-partners-sina-com/

Weekend round-up

Narrowband blues, 2004 predictions, VeriSign scuttles Symantec, Dloader/Xombie
Narrowband blues, 2004 predictions, VeriSign scuttles Symantec, Dloader/Xombie It's been a busy few days as 2004 starts to get into full swing. VB has a roundup of the weekend's… https://www.virusbulletin.com/blog/2004/01/weekend-round/

Security-conscious processors

AMD and Intel prep technology to prevent buffer overflows at the hardware level.
AMD and Intel prep technology to prevent buffer overflows at the hardware level. IT news site Silicon.com has published an article about hardware security in CPUs to prevent… https://www.virusbulletin.com/blog/2004/01/security-conscious-processors/

2004

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsJanuary issue released The Virus Bulletin January 2005 issue is on its way. 23 December 2004Latest VGrep The latest version of the virus name lookup tool - VGrep, is now… https://www.virusbulletin.com/blog/2004/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/01/

US and UK spam legislation in place

Anti-spam legislation in place.
Anti-spam legislation in place. While the 'CAN-SPAM Act' is expected to have been signed into US law by 1 January 2004, December 2003 saw the introduction of anti-spam… https://www.virusbulletin.com/blog/2003/12/us-and-uk-spam-legislation-place/

Number crunching

Calculating the average cost of a virus attack - estimates or guesstimates?
Calculating the average cost of a virus attack - estimates or guesstimates? This month has seen a flurry of the traditional end-of-year predictions for the security challenges in… https://www.virusbulletin.com/blog/2003/12/number-crunching/

SAS - the SysAsmin Service?

Computer security experts prepare to become special constables.
Computer security experts prepare to become special constables. A set of proposals for tackling computer crime has been published by UK Parliamentary lobby group EURIM and the… https://www.virusbulletin.com/blog/2003/12/sas-sysasmin-service/

Seasonal spamming

Increase in spam in lead up to holiday season.
Increase in spam in lead up to holiday season. A recent study carried out by Corvigo, suggests that the volume of spam in our inboxes showed a marked increase over the lead up to… https://www.virusbulletin.com/blog/2003/12/seasonal-spamming/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2003/12/

SpamCop snapped up

IronPort Systems to purchase SpamCop
IronPort Systems to purchase SpamCop According to the IDG News Service, email security hardware manufacturer IronPort Systems Inc. is set to announce its purchase of anti-spam… https://www.virusbulletin.com/blog/2003/12/spamcop-snapped/

VB2004 call for papers

Virus Bulletin calls for all speakers papers.
Virus Bulletin calls for all speakers papers. full article Posted on 05 January 2004 by Virus Bulletin https://www.virusbulletin.com/blog/2003/11/call-papers/

The menace within

Is BitDefender really staffed by Romanian vampire hackers...?
Is BitDefender really staffed by Romanian vampire hackers...? A recent report by the Associated Press claims that 'computer-savvy Romanians are fast emerging as a bold menace in… https://www.virusbulletin.com/blog/2003/11/menace-within/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2003/11/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.