Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya K Sood (F5)
Rohit Bansal (Independent)

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Read more  

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

Aditya K Sood (Advanced Threat Research Center of Excellence, Office of the CTO, F5)

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Read more  

Collector-stealer: a Russian origin credential and information extractor

Rohit Chaturvedi (Advanced Threat Research Center of Excellence, Office of the CTO, F5)
Aditya K Sood (Advanced Threat Research Center of Excellence, Office of the CTO, F5)

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Read more  

Fighting Fire with Fire

joe wells
Megan Palfrey (Virus Bulletin)

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Read more  

Run your malicious VBA macros anywhere!

Kurt Natvig (Independent Researcher)

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…

Read more  

Dissecting the design and vulnerabilities in AZORult C&C panels

Aditya K Sood (Research Team at Office of The CTO, F5)

Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified during the research.

Read more  

Excel Formula/Macro in .xlsb?

Kurt Natvig (Forcepoint)

Excel Formula, or XLM – does it ever stop giving pain to researchers? Kurt Natvig takes us through his analysis of a new sample using the xlsb file format.

Read more  

Decompiling Excel Formula (XF) 4.0 malware

Kurt Natvig (Forcepoint)

Office malware has been around for a long time, but until recently Excel Formula (XF) 4.0 was not something researcher Kurt Natvig was very familiar with. In this article Kurt allows us to learn with him as he takes a deeper look at XF 4.0.

Read more  

APT vs Internet service providers – a threat hunter's perspective

Emanuele De Lucia (Telsy)

Organizations in the telecommunications sector are faced with a multitude of threats, ranging from targeted attacks to malicious actions attributable to the criminal or activist world. Telsy researcher Emanuele De Lucia reports what he observed in…

Read more  

VB2019 paper: APT cases exploiting vulnerabilities in region‑specific software

Shusei Tomonaga (JPCERT/CC)
Tomoaki Tani (JPCERT/CC)
Hiroshi Soeda (JPCERT/CC)
Wataru Takahashi (JPCERT/CC)

Some APT attacks are carried out by exploiting vulnerabilities in region-specific software. Government agencies frequently use such localized software, and this tends to be the target of attackers. In Japan, there have been many cases where attacks…

Read more  
Previous1234567...114Next

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.