VB Blog

VB2017 paper: Nine circles of Cerber

Posted by   Martijn Grooten on   Dec 15, 2017

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool worked; we have also uploaded the video of the presentation of this paper, by Or Eshed and Yaniv Balmas.

Read more  

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Posted by   Martijn Grooten on   Dec 14, 2017

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Read more  

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

Posted by   Martijn Grooten on   Dec 14, 2017

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Read more  

Security Planner gives security advice based on your threat model

Posted by   Martijn Grooten on   Dec 13, 2017

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

Read more  

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Posted by   Martijn Grooten on   Dec 11, 2017

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.

Read more  

VB2017 paper: Modern reconnaissance phase on APT – protection layer

Posted by   Martijn Grooten on   Dec 7, 2017

During recent research, Cisco Talos researchers observed the ways in which APT actors are evolving and how a reconnaissance phase is included in the infection vector in order to protect valuable zero-day exploits or malware frameworks. At VB2017 in Madrid, two of those researchers, Paul Rascagneres and Warren Mercer, presented a paper detailing five case studies that demonstrate how the infection vector is evolving. Today we publish both Paul and Warren's paper and the recording of their presentation.

Read more  

VB2017 paper: Peering into spam botnets

Posted by   Martijn Grooten on   Dec 1, 2017

At VB2017 in Madrid, CERT Poland researchers Maciej Kotowicz and Jarosław Jedynak presented a paper detailing their low-level analysis of five spam botnets. Today we publish their full paper.

Read more  

Throwback Thursday: Anti-malware testing undercover

Posted by   Martijn Grooten on   Nov 30, 2017

We look back at the VB2016 presentation by Righard Zwienenberg (ESET) and Luis Corrons (Panda Security), in which they discussed various issues relating to anti-malware testing.

Read more  

Virus Bulletin relaunches VB Security Jobs Market for both employers and job seekers

Posted by   Martijn Grooten on   Nov 30, 2017

As an independent body in the IT security industry, Virus Bulletin is in an ideal position to act as a global source of information both about jobs currently available in the field and about those candidates currently seeking to start or progress their career in the industry - which is why we have relaunched the VB Security Jobs Market.

Read more  

VB2017 paper: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Nov 29, 2017

At VB2017 in Madrid, macOS malware researcher Patrick Wardle presented the details of a specific piece of Mac malware, FruitFly, which he analysed through a custom C&C server - a technique that will also be of interest for researchers of malware on other platforms. Today we publish both Patrick's paper and the recording of his presentation.

Read more  

Search blog

Major seeding of Storm trojans seen

Latest wave of variants followed up by further fake warnings.
Latest wave of variants followed up by further fake warnings. Yet another wave of malware has been widely spammed out, using similar tactics to previous attacks evolving from the… https://www.virusbulletin.com/blog/2007/04/major-seeding-storm-trojans-seen/

Spam-fighters coalition formed

ICSA announces cooperative forum of anti-spam developers.
ICSA announces cooperative forum of anti-spam developers.CyberTrust-owned ICSA Labs has announced the formation of the Anti-Spam Product Developers' Consortium, a grouping of… https://www.virusbulletin.com/blog/2007/04/spam-fighters-coalition-formed/

US lengthens lead as top spammer

Rivals improve record to leave US spamming rate a standout.
Rivals improve record to leave US spamming rate a standout. The US remains the world's leading source of spam, easily beating off competition from rivals China and several European… https://www.virusbulletin.com/blog/2007/04/us-lengthens-lead-top-spammer/

Linux/iPod proof-of-concept sighted

New minority platform joins infectable list.
New minority platform joins infectable list. Virus analysts have reported receiving samples of a proof-of-concept virus for the iPodLinux operating system, a port of the… https://www.virusbulletin.com/blog/2007/04/linux-ipod-proof-concept-sighted/

Microsoft reveals more issues on Patch Tuesday

Fix for earlier .ani patch and another Vista issue included in batch.
Fix for earlier .ani patch and another Vista issue included in batch. Five out of six vulnerabilities patched by Microsoft yesterday, in April's 'Patch Tuesday' monthly security… https://www.virusbulletin.com/blog/2007/04/microsoft-reveals-more-issues-patch-tuesday/

UK ISP association issues spam guidelines

ISPA best practices document advises providers on spam control.
ISPA best practices document advises providers on spam control. The UK Internet Services Providers' Association (ISPA), a voluntary grouping of service providers and other Internet… https://www.virusbulletin.com/blog/2007/04/uk-isp-association-issues-spam-guidelines/

Kaspersky patches series of vulnerabilities

ActiveX and overflow issues allowed remote data theft, local system attacks.
ActiveX and overflow issues allowed remote data theft, local system attacks. Several vulnerabilities have been revealed in many Kaspersky security products, including ActiveX flaws… https://www.virusbulletin.com/blog/2007/04/kaspersky-patches-series-vulnerabilities/

Swiss spam law to enforce user security

New law may penalise careless zombie hosts.
New law may penalise careless zombie hosts. New anti-spam laws come into effect in Switzerland on Sunday, imposing strict curbs on spamming and strong punishment for perpetrators.… https://www.virusbulletin.com/blog/2007/04/swiss-spam-law-enforce-user-security/

Spam costing US companies over $70 billion per year

Survey finds junk email costs $713 per head in loss of productivity.
Survey finds junk email costs $713 per head in loss of productivity. A study into the impact of spam on US businesses has produced some startling figures for the financial impact… https://www.virusbulletin.com/blog/2007/04/spam-costing-us-companies-over-70-billion-year/

NASA hacker loses case against extradition

UK man should face trial in States despite threats, say judges.
UK man should face trial in States despite threats, say judges. Greg McKinnon, the British hacker accused of breaking into NASA and US military networks while apparently… https://www.virusbulletin.com/blog/2007/04/nasa-hacker-loses-case-against-extradition/

Animated cursor flaw patched out of cycle

Microsoft reacts fast to widespread zero-day exploitation.
Microsoft reacts fast to widespread zero-day exploitation.Microsoft have once again broken their monthly patching cycle to release a fix for a vulnerability which has been the… https://www.virusbulletin.com/blog/2007/04/animated-cursor-flaw-patched-out-cycle/

VB2007 conference programme revealed

VB has revealed the conference programme for VB2007, Vienna.
VB has revealed the conference programme for VB2007, Vienna. VB has revealed the conference programme for VB2007, Vienna. Once again, the three-day conference programme boasts… https://www.virusbulletin.com/blog/2007/04/conference-programme-revealed/

Scammers launch anti-terrorist hotline

Met Police website spoofed by 419 scammers.
Met Police website spoofed by 419 scammers. Last month saw the appearance of the latest 419 scamming trick: 'anti-terrorist certificates' sold via a fake version of the London… https://www.virusbulletin.com/blog/2007/04/scammers-launch-anti-terrorist-hotline/

Phishing attacks reach new high

APWG releases phishing figures for January.
APWG releases phishing figures for January. Phishing attacks and password-stealing applications both reached record levels in January 2007 according to the latest report from the… https://www.virusbulletin.com/blog/2007/04/phishing-attacks-reach-new-high/

Third round for US anti-spyware bill

Anti-spyware legislation presented in US House of Representatives for third time.
Anti-spyware legislation presented in US House of Representatives for third time. Anti-spyware legislation was presented for the third time in the US House of Representatives last… https://www.virusbulletin.com/blog/2007/04/third-round-us-anti-spyware-bill/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/04/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2007 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2007/04/april-issue-vb-published/

TJX hack thought biggest ever

Over 45 million card numbers gathered in massive breach.
Over 45 million card numbers gathered in massive breach. A report into a security breach at major US retailer TJX has revealed a lengthy and sophisticated attack which scooped vast… https://www.virusbulletin.com/blog/2007/03/tjx-hack-thought-biggest-ever/

Fujacks writer's removal tool slated

Virus creator's anti-virus not up to scratch, says Symantec.
Virus creator's anti-virus not up to scratch, says Symantec. A cleanup tool created by the writer of the Fujacks virus, also known as the 'Panda burning incense' virus in reference… https://www.virusbulletin.com/blog/2007/03/fujacks-writer-s-removal-tool-slated/

Another Windows zero-day exploit seen in wild

Trojans sneaking in through animated cursor flaw.
Trojans sneaking in through animated cursor flaw. A vulnerability has been discovered in the handling of .ani files, used for animated cursors on web pages and in HTML emails, and… https://www.virusbulletin.com/blog/2007/03/another-windows-zero-day-exploit-seen-wild/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.