VB Blog

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

Posted by   Martijn Grooten on   Nov 22, 2019

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his presentation.

Read more  

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Posted by   Martijn Grooten on   Nov 21, 2019

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution and the affiliate scheme behind it. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Domestic Kitten: an Iranian surveillance program

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video of their presentation.

Read more  

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

Posted by   Martijn Grooten on   Nov 18, 2019

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

Read more  

VB2019 paper: DNS on fire

Posted by   Martijn Grooten on   Nov 7, 2019

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

Read more  

German Dridex spam campaign is unfashionably large

Posted by   Martijn Grooten on   Nov 6, 2019

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Read more  

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

Posted by   Martijn Grooten on   Nov 5, 2019

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

Read more  

Emotet continues to bypass many email security products

Posted by   Martijn Grooten on   Nov 4, 2019

Having returned from a summer hiatus, Emotet is back targeting inboxes and, as seen in the VBSpam test lab, doing a better job than most other malicious campaigns at bypassing email security products.

Read more  

VB2019 paper: We need to talk - opening a discussion about ethics in infosec

Posted by   Martijn Grooten on   Nov 1, 2019

Those working in the field of infosec are often faced with ethical dilemmas that are impossible to avoid. Today, we publish a VB2019 paper by Kaspersky researcher Ivan Kwiatkowski looking at ethics in infosec as well as the recording of Ivan's presentation.

Read more  

Stalkerware poses particular challenges to anti-virus products

Posted by   Martijn Grooten on   Oct 31, 2019

Malware used in domestic abuse situations is a growing threat, and the standard way for anti-virus products to handle such malware may not be good enough. But that doesn't mean there isn't an important role for anti-virus to play.

Read more  

Search blog

Spyware firms charged $2 million

FTC takes cash, bans from future naughtiness.
FTC takes cash, bans from future naughtiness.Enternet Media and ConSpy & Co., the companies behind products including Miracle Search and EliteBar, have been forced to pay out over… https://www.virusbulletin.com/blog/2006/09/spyware-firms-charged-2-million/

Subliminal message hidden in spam

Mail campaign aims to sneak into readers' subconscious minds.
Mail campaign aims to sneak into readers' subconscious minds. A spam campaign is using the classic 'submliminal message' technique in an attempt to implant thoughts in the minds of… https://www.virusbulletin.com/blog/2006/09/subliminal-message-hidden-spam/

Nine years for spam felon

Tough sentence upheld despite free-speech claims.
Tough sentence upheld despite free-speech claims. A US man convicted two years ago under the state of Virginia's anti-spam laws has lost an appeal against his conviction. The case,… https://www.virusbulletin.com/blog/2006/09/nine-years-spam-felon/

Word zero-day exploited

Trojan uses unpatched hole in office software.
Trojan uses unpatched hole in office software. At least one trojan has been seen in the wild exploiting a newly discovered vulnerability in Microsoft's Word 2000 software. The… https://www.virusbulletin.com/blog/2006/09/word-zero-day-exploited/

Phishing on the rise

One in three malicious emails a phish, says MessageLabs.
One in three malicious emails a phish, says MessageLabs. A report on the current state of digital security has revealed that phishing scams constitute a growing danger to computer… https://www.virusbulletin.com/blog/2006/09/phishing-rise/

Gromozon mystery clearing

Cleaner tool aims to remove sophisticated attack.
Cleaner tool aims to remove sophisticated attack. The shadowy blended threat known as Gromozon has slowly been gaining notoriety in recent weeks, particularly after some in-depth… https://www.virusbulletin.com/blog/2006/09/gromozon-mystery-clearing/

CA in Windows FP

eTrust identifies critical file as virus.
eTrust identifies critical file as virus. A mistake at CA caused some trouble over the weekend, as its eTrust products started identifying part of the Windows local authentication… https://www.virusbulletin.com/blog/2006/09/ca-windows-fp/

Mobile snoopware labelled spyware

Future phone privacy threatened.
Future phone privacy threatened. Reports this week highlighted the problem of spyware running on mobile phones, and the consequences this could have for privacy. A commercial… https://www.virusbulletin.com/blog/2006/09/mobile-snoopware-labelled-spyware/

New New Zealand spam laws to allow spam

Adjustments to laws may let 'non-commercial' spam continue.
Adjustments to laws may let 'non-commercial' spam continue. Recommendations have been made to dilute tough new anti-spam laws currently being debated by the New Zealand government.… https://www.virusbulletin.com/blog/2006/09/new-new-zealand-spam-laws-allow-spam/

A fine, a curfew and a treasure hunt

Round up of the month's spammer penalties.
Round up of the month's spammer penalties. Kicking off a round-up of some of the anti-spam penalties issued worldwide this month, the Chinese government has made an underwhelming… https://www.virusbulletin.com/blog/2006/09/fine-curfew-and-treasure-hunt/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2006 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2006/09/september-issue-vb-published/

Spot that spammer

Quiz tests consumers' ability to identify spam causing sites.
Quiz tests consumers' ability to identify spam causing sites. Last month, McAfee invited web users to spot the undesirable website, in an eight-question quiz entitled: 'Can you… https://www.virusbulletin.com/blog/2006/09/spot-spammer/

Nearly VB 100%

Near misses.
Near misses. In the recent Windows XP comparative review (see VB, June 2006, p.11), VB reported that VirusBuster failed to achieve the results required for a VB 100% award. After… https://www.virusbulletin.com/blog/2006/09/nearly-vb-100/

Testing patience

Consumer Reports does it again.
Consumer Reports does it again. After having come in for a great deal of criticism in recent weeks over its AV testing methodology (see VB, September 2006, p.2), Consumer Reports… https://www.virusbulletin.com/blog/2006/09/testing-patience/

Worm spreads via mobiles. Maybe.

PC malware thought capable of using phones as vector.
PC malware thought capable of using phones as vector.F-Secure has reported a new worm which attempts to spread via mobile phones. The 'Mobler' worm, once activated, copies itself… https://www.virusbulletin.com/blog/2006/09/worm-spreads-mobiles-maybe/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/09/

Future browsers battle phishing

Microsoft and Mozilla's upcoming new versions to include safety measures.
Microsoft and Mozilla's upcoming new versions to include safety measures. Pre-release versions of both Mozilla FireFox 2 and Microsoft Internet Explorer 7 have been unveiled,… https://www.virusbulletin.com/blog/2006/09/future-browsers-battle-phishing/

More MS06-040 worries

Vulnerability still causing problems.
Vulnerability still causing problems. There have been further reports of malware spreading using the MS06-040 vulnerability, announced and patched three weeks ago on Microsoft's… https://www.virusbulletin.com/blog/2006/09/more-ms06-040-worries/

AT&T hack led to spearphish

Stolen details used to trick victims out of further info.
Stolen details used to trick victims out of further info. Transaction details stolen as part of last weekend's security breach of a shopping site run by US phone giant AT&T were… https://www.virusbulletin.com/blog/2006/09/amp-t-hack-led-spearphish/

Phone companies' security shaken

As T-Mobile hacker is convicted, AT&T reveals break-in.
As T-Mobile hacker is convicted, AT&T reveals break-in. A 23-year-old Oregon resident has been sentenced to a year of 'home detention', after being convicted of hacking into the… https://www.virusbulletin.com/blog/2006/08/phone-companies-security-shaken/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.