VB Blog

Paper: Inside the iOS/AdThief malware

Posted by   Virus Bulletin on   Aug 12, 2014

75,000 jailbroken iOS devices infected with malware that steals ad revenues.

Read more  

$83k in bitcoins 'stolen' through BGP hijack

Posted by   Virus Bulletin on   Aug 8, 2014

Short-lived network changes used to make miners connect to rogue pool.

Read more  

Report: 15 solutions achieve VBSpam award

Posted by   Virus Bulletin on   Aug 7, 2014

Despite short spike, image spam no problem for spam filters.

Read more  

Researchers release CryptoLocker decryption tool

Posted by   Virus Bulletin on   Aug 6, 2014

Tool uses private keys found in database of victims.

Read more  

Paper: IcoScript: using webmail to control malware

Posted by   Virus Bulletin on   Aug 4, 2014

RAT gets instructions from Yahoo Mail address.

Read more  

Paper: Learning about Bflient through sample analysis

Posted by   Virus Bulletin on   Jul 30, 2014

Flexible module-handling mechanism allows malware to adjust functionalities at will.

Read more  

Report: VB100 comparative review on Windows 7

Posted by   Virus Bulletin on   Jul 29, 2014

29 out of 35 tested products earn VB100 award.

Read more  

Call for last-minute papers for VB2014 announced

Posted by   Virus Bulletin on   Jul 21, 2014

Seven speaking slots waiting to be filled with presentations on 'hot' security topics.

Read more  

Paper: Mayhem - a hidden threat for *nix web servers

Posted by   Virus Bulletin on   Jul 17, 2014

New kind of malware has the functions of a traditional Windows bot, but can act under restricted privileges in the system.

Read more  

Google's Project Zero to hunt for zero-days

Posted by   Virus Bulletin on   Jul 16, 2014

Bugs to be reported to the vendor only, and to become public once patched.

Read more  

Search blog

'Mobile Thursday' at the VB conference

Record number of presentations dedicated to threats affecting smartphones.
Record number of presentations dedicated to threats affecting smartphones. The significant increase in mobile threats is reflected in the VB2013 programme, which includes seven… https://www.virusbulletin.com/blog/2013/09/mobile-thursday-vb-conference/

VB2013 speaker spotlight

We speak to VB2013 presenter Sergey Golovanov about business-to-government malware.
We speak to VB2013 presenter Sergey Golovanov about business-to-government malware. The VB2013 conference takes place this autumn (2-4 October) in Berlin, with an exciting… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-golovanov/

VB2013 last-minute papers and keynote announced

Hot topics to be covered at VB conference in Berlin.
Hot topics to be covered at VB conference in Berlin. We thought that the 45 previously announced VB2013 papers, together with the panel discussion, already made for a really… https://www.virusbulletin.com/blog/2013/09/last-minute-papers-and-keynote-announced/

Backdoored standards show we desperately need more cryptographers

Too few currently possess the skills to verify standards.
Too few currently possess the skills to verify standards. Recent revelations of the NSA's crypto-breaking capabilities have led to calls for better cryptography. But we need more… https://www.virusbulletin.com/blog/2013/09/backdoored-standards-show-we-desperately-need-more-cryptographers/

Syrian conflict used in pump-and-dump spam

Short campaign could have had desired effect.
Short campaign could have had desired effect.Pump-and-dump spam is almost as old as spam itself: emails are sent out promoting worthless 'penny stocks', which have been purchased… https://www.virusbulletin.com/blog/2013/09/syrian-conflict-used-pump-and-dump-spam/

VB2013 speaker spotlight

We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.
We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-serbanoiu/

Box-ticking mentality leads to insecurity

Credit card company fails to understand how authentication works.
Credit card company fails to understand how authentication works. Security experts often bemoan a 'box-ticking' mentality and argue that in many cases ticking boxes doesn't address… https://www.virusbulletin.com/blog/2013/09/box-ticking-mentality-leads-insecurity/

Updated botnet likely cause of surge in Tor traffic

New Tor version should help the network deal with increased traffic.
New Tor version should help the network deal with increased traffic. Sometimes a picture says more than a thousand words: The graph shows the daily number of users of the Tor… https://www.virusbulletin.com/blog/2013/09/updated-botnet-likely-cause-surge-tor-traffic/

Malware spoofing HTTP Host header to hide C&C communication

Traffic appears as requests to Google or Yandex.
Traffic appears as requests to Google or Yandex. There have been several recent examples of malware using a spoofed HTTP Host header to hide communucation with its control servers.… https://www.virusbulletin.com/blog/2013/09/malware-spoofing-http-host-header-hide-c-amp-c-communication/

Phone support scams: an old scam with some new tricks

Files in Prefetch directory supposedly show malware infections.
Files in Prefetch directory supposedly show malware infections. Telephone support scams have been going on for quite a long time, and have received a fair amount of publicity,… https://www.virusbulletin.com/blog/2013/09/phone-support-scams-old-scam-some-new-tricks/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/09/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2013 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2013/09/september-issue-vb-published/

VB2013 speaker spotlight

We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates.
We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates. The VB2013 conference takes place this autumn (2-4 October) in Berlin,… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-blackbirdpfeifer/

Kelihos checks machines' IP addresses against DNS blacklists

Role of node in a botnet dependent on whether the IP address is blacklisted.
Role of node in a botnet dependent on whether the IP address is blacklisted. Whenever I look at the results of the VBSpam tests, it always amazes me how large a percentage of spam… https://www.virusbulletin.com/blog/2013/08/kelihos-checks-machines-ip-addresses-against-dns-blacklists/

New email header attempts to prevent damage of reissued email addresses

Transactional emails not delivered if the account's owner has changed in the meantime.
Transactional emails not delivered if the account's owner has changed in the meantime. When in June, Yahoo announced it would free up inactive user IDs, it received fierce… https://www.virusbulletin.com/blog/2013/08/new-email-header-attempts-prevent-damage-reissued-email-addresses/

VB2013 speaker spotlight

We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective.
We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective. The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-ollmann/

VB2013 speaker spotlight

We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013.
We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013. The VB2013 conference takes place this autumn… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-unuchek/

DNSSEC glitch causes .gov sites to become inaccessible

Name servers unable to distinguish faulty from rogue responses.
Name servers unable to distinguish faulty from rogue responses. A glitch at VeriSign yesterday led to DNSSEC-aware name servers being unable to verify responses on the .gov… https://www.virusbulletin.com/blog/2013/08/dnssec-glitch-causes-gov-sites-become-inaccessible/

Researchers demonstrate how IPv6 can easily be used to perform MitM attacks

Many devices simply waiting for router advertisements, good or evil.
Many devices simply waiting for router advertisements, good or evil. When early last year I was doing research for an article on IPv6 and security, I was surprised to learn how… https://www.virusbulletin.com/blog/2013/08/researchers-demonstrate-how-ipv6-can-easily-be-used-perform-mitm-attacks/

VB2013 speaker spotlight

We speak to VB2013 presenters Ilya Rabinovich and Randy Abrams about their research, Windows 8 security, and what they aim to bring to VB2013.
We speak to VB2013 presenters Ilya Rabinovich and Randy Abrams about their research, Windows 8 security, and what they aim to bring to VB2013. The VB2013 conference takes place… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-rabinovich-abrams/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.