Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Win32/Induc.C: getting noisier in the library

The Induc virus has been spreading successfully around the world since its first appearance in 2009, but back then it didn't contain a malicious payload. However, the latest variant contains a genuinely malicious payload and additional file-infecting…

Read more  

As above, Sobelow

‘Heaven’s Gate' is an undocumented feature used by the 32-bit Windows environment when running on 64-bit versions of Windows, which allows for the transition between 32-bit and 64-bit code. In August 2011, we saw the first virus to make use of it.…

Read more  

All your lulz will belong to us

‘Attribution is one of the things in the IT security industry that is dropped on the floor.' Anon

Read more  

Mobile botnets for smartphones: an unfolding catastrophe?

The number of users subscribing to the voice, Internet and messaging services of cellular networks is increasing exponentially worldwide and the potential development of cellular botnets poses a serious threat. Hasan Ijaz and colleagues present a…

Read more  

Happy holidays

Happy holidays from the VB team.

Read more  

Flibi: reloaded

A new version of the W32/Flibi virus has been released. It now supports assemble-time or compile-time polymorphism during construction of the first generation translator code and its parallels with molecular biology have increased. Peter Ferrie…

Read more  

Spitmo – SpyEye component for Symbian

Despite the Windows versions of Zeus and SpyEye now sharing source code, Zitmo and Spitmo - the mobile components of each - have nothing in common at the code level. Spitmo was created from scratch solely for the purpose of stealing mTANs. Mikko…

Read more  

Within the margin of error

‘Only 3% of the webmasters responded... Tanase had rediscovered the Bontchev constant.’ Gabor Szappanos, VirusBuster

Read more  

The art of stealing banking information – form grabbing on fire

Botnets such as Zeus, SpyEye and others use the effective technique of form grabbing to steal sensitive information from victims’ machines. Aditya Sood and his colleagues take a detailed look at the form-grabbing technique.

Read more  

Spammers link to yet-to-be registered domains

Martijn Grooten (Virus Bulletin)

Increase reported in spamvertized URLs using domains that are yet to be registered.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.