Catching the silent whisper: understanding the Derusbi family tree

Friday 2 October 11:30 - 12:00, Green room

Neo Tan (Fortinet)
Micky Pun (Fortinet)
Eric Leung (Fortinet)

  download slides (PDF)

From stealing sensitive information from Mitsubishi Heavy Industries in 2011 to the Anthem data breach revealed in February 2015, the complexity of the Derusbi malware family has been the real driving force behind these espionage campaigns. Upon entering a targeted company through an exploit of a newly discovered vulnerability, a Derusbi sample would be dropped onto the compromised computer with the purpose of setting up a well hidden 'gateway' to the targeted organization. Its sophistication, along with its uncommon malicious activity added to its covert presence and led to its hiding from the sight of many AV companies. As an illustration, our records reveal that many vendors did not start to detect a certain Derusbi variant until after it has been circulating among vendors for about half a year. In this presentation, instead of profiling the malware authors, we will mainly focus on the technical aspect of analysing the Derusbi malware family as well as how it has evolved through the years in order to stay under the radar of most AV vendors.

Click here for more details about the conference.

Micky Pun

Micky Pun

Micky Pun is a Security Researcher at Fortinet Canada. She received her Bachelor's degree in computer engineering from Simon Fraser University in 2010. After graduation, she worked as a malware analyst at Fortinet for three years. She later took on the role of Malware Researcher in the Malware and Vulnerability Research Team (MVRT) and focuses on software development related to threat detection. Micky has on several occasions presented research papers at Virus Bulletin (VB) Conferences and published articles in VB Magazine. Her research interests include generic malicious characteristic extraction, botnet, APT and vulnerability research.

Eric Leung

Eric Leung

Eric Leung is an anti-virus analyst and is a member in the Malware and Vulnerability Research Team (MVRT) at Fortinet Inc. He holds a Bachelor's degree in electronics engineering and applied mathematics. His research interests include botnets, exploits and vulnerabilities.

Neo Tan

Neo Tan

Neo Tan is the Manager in the MVRT team at Fortinet Inc. He is not only an experienced software developer but also a senior malware reverse-engineer. His research interests include exploits, custom packers, botnets, cryptography and machine learning.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.