VB Blog

VB2017 paper: Nine circles of Cerber

Posted by   Martijn Grooten on   Dec 15, 2017

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool worked; we have also uploaded the video of the presentation of this paper, by Or Eshed and Yaniv Balmas.

Read more  

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Posted by   Martijn Grooten on   Dec 14, 2017

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Read more  

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

Posted by   Martijn Grooten on   Dec 14, 2017

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Read more  

Security Planner gives security advice based on your threat model

Posted by   Martijn Grooten on   Dec 13, 2017

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

Read more  

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Posted by   Martijn Grooten on   Dec 11, 2017

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.

Read more  

VB2017 paper: Modern reconnaissance phase on APT – protection layer

Posted by   Martijn Grooten on   Dec 7, 2017

During recent research, Cisco Talos researchers observed the ways in which APT actors are evolving and how a reconnaissance phase is included in the infection vector in order to protect valuable zero-day exploits or malware frameworks. At VB2017 in Madrid, two of those researchers, Paul Rascagneres and Warren Mercer, presented a paper detailing five case studies that demonstrate how the infection vector is evolving. Today we publish both Paul and Warren's paper and the recording of their presentation.

Read more  

VB2017 paper: Peering into spam botnets

Posted by   Martijn Grooten on   Dec 1, 2017

At VB2017 in Madrid, CERT Poland researchers Maciej Kotowicz and Jarosław Jedynak presented a paper detailing their low-level analysis of five spam botnets. Today we publish their full paper.

Read more  

Throwback Thursday: Anti-malware testing undercover

Posted by   Martijn Grooten on   Nov 30, 2017

We look back at the VB2016 presentation by Righard Zwienenberg (ESET) and Luis Corrons (Panda Security), in which they discussed various issues relating to anti-malware testing.

Read more  

Virus Bulletin relaunches VB Security Jobs Market for both employers and job seekers

Posted by   Martijn Grooten on   Nov 30, 2017

As an independent body in the IT security industry, Virus Bulletin is in an ideal position to act as a global source of information both about jobs currently available in the field and about those candidates currently seeking to start or progress their career in the industry - which is why we have relaunched the VB Security Jobs Market.

Read more  

VB2017 paper: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Nov 29, 2017

At VB2017 in Madrid, macOS malware researcher Patrick Wardle presented the details of a specific piece of Mac malware, FruitFly, which he analysed through a custom C&C server - a technique that will also be of interest for researchers of malware on other platforms. Today we publish both Patrick's paper and the recording of his presentation.

Read more  

Search blog

Phishing techniques

Sorin Mustaca documents common and emerging phishing techniques.
Sorin Mustaca documents common and emerging phishing techniques. Despite the fact that phishing is receiving increasing amounts of media coverage, and people are more aware than… https://www.virusbulletin.com/blog/2007/03/phishing-techniques/

March

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/03/

UK watchdog body backs phishing victims

Consumer group Which? urges banks to protect customers scammed online.
Consumer group Which? urges banks to protect customers scammed online. Major UK consumer protection organisation Which? has issued a call for a change to rules regarding… https://www.virusbulletin.com/blog/2007/03/uk-watchdog-body-backs-phishing-victims/

News round-up

February's goings on in the anti-malware industry.
February's goings on in the anti-malware industry. Mobile security was something of a key theme last month, with a rash of new products released alongside updates to those… https://www.virusbulletin.com/blog/2007/03/news-round/

Cartoon trojan threatens P2P users

Illegal Japanese file-sharers warned off by anime character malware.
Illegal Japanese file-sharers warned off by anime character malware. A series of trojans have been spotted targeting users of popular Japanese file-sharing system Winny. The… https://www.virusbulletin.com/blog/2007/02/cartoon-trojan-threatens-p2p-users/

Trend troubled by further flaw

Second vulnerability unveiled this month only affects server products.
Second vulnerability unveiled this month only affects server products. Less than two weeks after details of a UPX vulnerability affecting many of Trend Micro's products were… https://www.virusbulletin.com/blog/2007/02/trend-troubled-further-flaw/

FTC criticised for low adware fine

Latest DirectRevenue case nets mere $1.5 million penalty.
Latest DirectRevenue case nets mere $1.5 million penalty. Serial adware user DirectRevenue, along with several advertising clients, has agreed to settle a case brought by the US… https://www.virusbulletin.com/blog/2007/02/ftc-criticised-low-adware-fine/

Fujacks writers arrested in first for China

Eight seized for writing and selling cuddly panda malware.
Eight seized for writing and selling cuddly panda malware. Eight men have been arrested in the central Chinese province of Hubei, on suspicion of involvement in the creation and… https://www.virusbulletin.com/blog/2007/02/fujacks-writers-arrested-first-china/

Trend hit by UPX vulnerability

Compression handling issue affects swathe of products.
Compression handling issue affects swathe of products. A wide range of Trend Micro security products are affected by a flaw in the handling of files compressed with UPX, which… https://www.virusbulletin.com/blog/2007/02/trend-hit-upx-vulnerability/

Massive attack on web root servers

Large-scale DDoS barrage hits top-level DNS machines.
Large-scale DDoS barrage hits top-level DNS machines. An exceptionally large Distributed Denial of Service (DDoS) attack took place yesterday, targeting the root DNS servers at the… https://www.virusbulletin.com/blog/2007/02/massive-attack-web-root-servers/

Popular sites carrying Javascript attacks

Superbowl stadium among many hosting malware attack.
Superbowl stadium among many hosting malware attack. Malicious Javascript has been planted on numerous legitimate websites over the weekend, attempting to take advantage of known… https://www.virusbulletin.com/blog/2007/02/popular-sites-carrying-javascript-attacks/

Major brands hit with adware fines

Landmark case blames advertisers for malware tactics.
Landmark case blames advertisers for malware tactics. Three major brands, Priceline, Travelocity and Cingular Wireless, have settled a New York lawsuit charging them with using… https://www.virusbulletin.com/blog/2007/02/major-brands-hit-adware-fines/

VB100 news

This month: new platform, new logo.
This month: new platform, new logo. With the overall conclusion that the release of Vista will make little difference to the overall malware landscape, VB chose this month to put… https://www.virusbulletin.com/blog/2007/02/news/

Upcoming events

Round up of this year's must-attend spam events.
Round up of this year's must-attend spam events. The 2007 Spam Conference will take place on 30 March 2007 at MIT, Cambridge, MA, USA. The title for this year's conference is… https://www.virusbulletin.com/blog/2007/02/upcoming-events/

Microsoft steals market share

Symantec and McAfee see drops in market share.
Symantec and McAfee see drops in market share. A report by analyst firm NPD Group has revealed that anti-malware heavyweights Symantec and McAfee both lost market share following… https://www.virusbulletin.com/blog/2007/02/microsoft-steals-market-share/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/02/

Vista security concerns

'Dramatically more secure'... or not?
'Dramatically more secure'... or not? January saw the full commercial release of Microsoft's latest operating system: the long-awaited Vista. Since its release arguments have… https://www.virusbulletin.com/blog/2007/02/vista-security-concerns/

UK police 'can no longer cope' with e-crime

Report demands more resources and national IT squad.
Report demands more resources and national IT squad. A report issued by the Metropolitan Police has admitted that, despite serious under-reporting of computer-related crime… https://www.virusbulletin.com/blog/2007/01/uk-police-can-no-longer-cope-e-crime/

MySpace sues Spam King

Serial spammer faces more fines for abusing social system.
Serial spammer faces more fines for abusing social system. Regular spammer and lawsuit loser Scott Richter, last seen being sued by Infinite Monkeys, faces more legal and financial… https://www.virusbulletin.com/blog/2007/01/myspace-sues-spam-king/

Fujacks hype incenses analysts

Chinese reports of 'major threat' thought unlikely.
Chinese reports of 'major threat' thought unlikely. Reports in the Chinese Shanghai Daily of a 'five-star cyber worm' which could be 'one of the most devastating cyber worms ever… https://www.virusbulletin.com/blog/2007/01/fujacks-hype-incenses-analysts/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.