VB Blog

VB2019 paper: Defeating APT10 compiler-level obfuscations

Posted by   Virus Bulletin on   Mar 13, 2020

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro's paper and the recording of his presentation.

Read more  

VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

Posted by   Virus Bulletin on   Mar 12, 2020

At VB2019 in London Michael Raggi (Proofpoint) and Ghareeb Saad (Anomali) presented a paper on the 'Royal Road' exploit builder (or weaponizer) and how the properties of RTF files can be used to track weaponizers and their users. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 presentation: Nexus between OT and IT threat intelligence

Posted by   Virus Bulletin on   Mar 11, 2020

Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners’ Summit at VB2019, Dragos cyber threat intelligence analyst Selena Larson gave a keynote on these similarities and differences. Today we release the recording of her presentation.

Read more  

VB2019 paper: Kimsuky group: tracking the king of the spear-phishing

Posted by   Virus Bulletin on   Mar 10, 2020

In a paper presented at VB2019 in London, researchers fron the Financial Security Institute detailed the tools and activities used by the APT group 'Kimsuky', some of which they were able to analyse through OpSec failures by the group. Today, we publish their paper.

Read more  

VB2019 paper: Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly

Posted by   Virus Bulletin on   Mar 9, 2020

In a paper presented at VB2019 in London, Trend Micro researchers Lilang Wu and Moony Li explained how the hunt for vulnerabilities in MacOS and iOS operating systems can be made both smarter and more automatic. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Finding drive-by rookies using an automated active observation platform

Posted by   Virus Bulletin on   Mar 6, 2020

In a last-minute paper presented at VB2019 in London, Rintaro Koike (NTT Security) and Yosuke Chubachi (Active Defense Institute, Ltd) discussed the platform they have built to automatically detect and analyse exploit kits. Today we publish the recording of their presentation.

Read more  

VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation state adversary

Posted by   Virus Bulletin on   Feb 28, 2020

The activities of China-based threat actor PKPLUG were detailed in a VB2019 paper by Palo Alto Networks researcher Alex Hinchliffe, who described the playbook of this long-standing adversary. Today we publish both Alex's paper and the recording of his presentation.

Read more  

VB2019 paper: Static analysis methods for detection of Microsoft Office exploits

Posted by   Virus Bulletin on   Feb 25, 2020

Today we publish the VB2019 paper and presentation by McAfee researcher Chintan Shah in which he described static analysis methods for the detection of Microsoft Office exploits.

Read more  

New paper: LokiBot: dissecting the C&C panel deployments

Posted by   Helen Martin on   Feb 17, 2020

First advertised as an information stealer and keylogger when it appeared in underground forums in 2015, LokiBot has added various capabilities over the years and has affected many users worldwide. In a new paper researcher Aditya Sood analyses the URL structure of the LokiBot C&C panels and how they have evolved over time.

Read more  

VB2019 presentation: Building secure sharing systems that treat humans as features not bugs

Posted by   Helen Martin on   Feb 14, 2020

In a presentation at VB2019 in London, Virtru's Andrea Limbago described how, by exploring data sharing challenges through a socio-technical lens, it is possible to make significant gains toward the secure sharing systems and processes that are vital for innovation and collaboration. Today we release the recording of her presentation.

Read more  

Search blog

OneCare labels Gmail a virus

Rival webmail system flagged infected by Microsoft AV.
Rival webmail system flagged infected by Microsoft AV. A number of users of Microsoft's anti-virus product Windows Live OneCare have reported being warned of a virus infection when… https://www.virusbulletin.com/blog/2006/11/onecare-labels-gmail-virus/

More US political spam

Voter persuasion campaign late and sloppy, says Panda
Voter persuasion campaign late and sloppy, says Panda Spam watchers at PandaLabs have spotted a campaign hoping to trick recipients into visiting a page attacking the state of US… https://www.virusbulletin.com/blog/2006/11/more-us-political-spam/

MS releases new Sysinternals utility

Process Monitor combines filemon, regmon into unified analysis tool.
Process Monitor combines filemon, regmon into unified analysis tool.Sysinternals, now 'a wholly owned subsidiary of Microsoft Corporation', has released a new system analysis tool… https://www.virusbulletin.com/blog/2006/11/ms-releases-new-sysinternals-utility/

Vista safe without AV, says Allchin

Microsoft chief confident in new security measures.
Microsoft chief confident in new security measures. During a telephone press conference, Microsoft Platform Products and Services Co-president Jim Allchin revealed that he lets his… https://www.virusbulletin.com/blog/2006/11/vista-safe-without-av-says-allchin/

Google blog spreads Kama Sutra worm

MyWife variant mailed to 50,000 video blog watchers.
MyWife variant mailed to 50,000 video blog watchers.Google has apologised to users of its Google Video Blog, some 50,000 of whom were exposed to an email worm after three postings… https://www.virusbulletin.com/blog/2006/11/google-blog-spreads-kama-sutra-worm/

US politicians slated for spam tactics

Report criticises leaders for election-pushing mass mail campaigns.
Report criticises leaders for election-pushing mass mail campaigns. A report from Sophos has criticised the behaviour of both major US political parties, after numerous emails… https://www.virusbulletin.com/blog/2006/11/us-politicians-slated-spam-tactics/

AOL ICQ vulnerability revealed

Chat program remote execution flaw patched.
Chat program remote execution flaw patched. Details of a vulnerability found in AOL's ICQ instant messaging software have been released by TippingPoint. The ActiveX flaw could… https://www.virusbulletin.com/blog/2006/11/aol-icq-vulnerability-revealed/

Email worm spams global war news

Bush and Putin still alive, no nuclear war ahead.
Bush and Putin still alive, no nuclear war ahead. An email worm is posing as news of global warfare and the death of major world leaders in an attempt to persuade recipients to… https://www.virusbulletin.com/blog/2006/11/email-worm-spams-global-war-news/

US way ahead in phishing and spam

PhishTank, Sophos stats put US at top of lists.
PhishTank, Sophos stats put US at top of lists. Statistics released by anti-phishing community project PhishTank, launched early last month, have put the US far ahead of the field… https://www.virusbulletin.com/blog/2006/11/us-way-ahead-phishing-and-spam/

XMLHTTP zero-day exploit

ActiveX vulnerability in use by attackers.
ActiveX vulnerability in use by attackers. A new flaw in Microsoft's XML Core Services 4.0 is in active use by malicious websites, with attackers using the vulnerability to… https://www.virusbulletin.com/blog/2006/11/xmlhttp-zero-day-exploit/

Adware costs Zango $3 million

Cash and promises settle deceptive practices case.
Cash and promises settle deceptive practices case. Adware giant Zango, formerly known as 180Solutions, has settled a case brought by the US Federal Trade Commission (FTC) for $3… https://www.virusbulletin.com/blog/2006/11/adware-costs-zango-3-million/

FBI busts phishing gang

Arrests made in Poland and US, more expected.
Arrests made in Poland and US, more expected. A large operation carried out by the FBI against a phishing operation has resulted in a string of arrests. Four people are being held… https://www.virusbulletin.com/blog/2006/11/fbi-busts-phishing-gang/

IE7 causing McAfee update problems

New browser version blocking install and updates.
New browser version blocking install and updates. Security settings in the new version of Microsoft's web browser, Internet Explorer 7, are causing problems for users of McAfee… https://www.virusbulletin.com/blog/2006/11/ie7-causing-mcafee-update-problems/

New OSX parasitic virus found

Symantec report proof-of-concept file infector for Mac.
Symantec report proof-of-concept file infector for Mac. Analysts at Symantec have received samples of a proof-of-concept file infector for the Apple Mac OSX platform. The virus,… https://www.virusbulletin.com/blog/2006/11/new-osx-parasitic-virus-found/

Spam worse than postal junk mail

Survey finds emails more irritating than unwanted paper.
Survey finds emails more irritating than unwanted paper. A study carried out by researchers from the University of Georgia's Grady College of Journalism and Mass Communication and… https://www.virusbulletin.com/blog/2006/11/spam-worse-postal-junk-mail/

Wikipedia spam points to malware

Emails used archive function to lend authenticity.
Emails used archive function to lend authenticity. Popular online encyclopaedia Wikipedia has been used as a vector for malware, with a spam campaign using the site's reputation… https://www.virusbulletin.com/blog/2006/11/wikipedia-spam-points-malware/

Academics create mobile malware

California University publishes Symbian proof of concept.
California University publishes Symbian proof of concept. A group of researchers at the University of California, Santa Barbara, (UCSB) have released details and source code for a… https://www.virusbulletin.com/blog/2006/11/academics-create-mobile-malware/

Spammed trojans posing as McAfee report

Campaign uses security news to bypass security.
Campaign uses security news to bypass security. A spam campaign has been spotted, with the emails claiming to come from security giant McAfee and to contain a report on recent… https://www.virusbulletin.com/blog/2006/11/spammed-trojans-posing-mcafee-report/

Spam hits record levels in October

Image-based pump-and-dumps add to inbox bloat.
Image-based pump-and-dumps add to inbox bloat. Spam levels have continued to rise, defying general trends that would suggest a decreasing post-summer ratio, as more people at work… https://www.virusbulletin.com/blog/2006/11/spam-hits-record-levels-october/

November issue of VB published

The November issue of Virus Bulletin is now available for subscribers to download.
The November issue of Virus Bulletin is now available for subscribers to download. The November 2006 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2006/11/november-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.