VB Blog

VB2014 Paper: Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the Bitcoin bonanza in the digital era

Posted by   Virus Bulletin on   Nov 4, 2014

Santiago Pontiroli takes us on a rollercoaster ride through cryptocurrency land.

Read more  

The VB2014 presentation you never saw. Early launch Android malware: your phone is 0wned

Posted by   Virus Bulletin on   Oct 31, 2014

Malicious apps may have more privileges than security software.

Read more  

CVE-2012-0158 continues to be used in targeted attacks

Posted by   Virus Bulletin on   Oct 31, 2014

30-month old vulnerability still a popular way to infect systems.

Read more  

Paper: Invading the core: iWorm's infection vector and persistence mechanism

Posted by   Virus Bulletin on   Oct 30, 2014

Malware spreads through infected torrent, then maintains persistence on the system.

Read more  

New IcoScript variant uses Gmail drafts for C&C communication

Posted by   Virus Bulletin on   Oct 29, 2014

Switch likely to make modular malware even stealthier.

Read more  

VB2014 paper: Hiding the network behind the network. Botnet proxy business model

Posted by   Virus Bulletin on   Oct 28, 2014

Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden.

Read more  

VB2014 paper: Methods of malware persistence on Mac OS X

Posted by   Virus Bulletin on   Oct 27, 2014

'KnockKnock' tool made available to the public.

Read more  

Tor exit node found to turn downloaded binaries into malware

Posted by   Virus Bulletin on   Oct 24, 2014

Tor provides anonymity, not security, hence using HTTPS is essential.

Read more  

VB2014 paper: Exposing Android white collar criminals

Posted by   Virus Bulletin on   Oct 22, 2014

Luis Corrons dives into the world of shady Android apps.

Read more  

Black Hat Europe - day 2

Posted by   Virus Bulletin on   Oct 20, 2014

IPv6 versus IDPS, XSS in WYSIWYG editors, and reflected file downloads.

Read more  

Search blog

VB2019 paper: Spoofing in the reeds with Rietspoof

In a VB2019 paper Avast researchers Jan Sirmer, Luigino Camastra and Adolf Středa revealed full details of the Rietspoof malware. Today we publish their paper and the recording of the presentation given by Jan and Luigino in London.
Spoofing in the reeds with Rietspoof Read the paper (HTML) Download the paper (PDF)     The Call for Papers for VB2020 in Dublin is open! Submit your abstract before… https://www.virusbulletin.com/blog/2020/01/vb2019-paper-spoofing-reeds-rietspoof/

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.
First discovered at the beginning of the year, the Spora ransomware has become one of of the most prominent ransomware families of 2017, especially in Russia, a region it appears… https://www.virusbulletin.com/blog/2017/12/vb2017-video-spora-saga-continues-k-how-ruin-your-research-week/

Malicious CCleaner update points to a major weakness in our infrastructure

Researchers from Cisco Talos have found that a recent version of the widely used CCleaner tool installed malware on the machine.
For the security community, 2017 might well be called the year of the update: two of the biggest security stories – the WannaCry outbreak and the Equifax breach – involved… https://www.virusbulletin.com/blog/2017/09/malicious-ccleaner-update-points-major-weakness-our-infrastructure/

Avast acquires AVG for $1.3bn

Anti-virus vendor Avast has announced the acquisition of its rival AVG for 1.3 billion US dollars.
There was interesting news in the anti-virus world yesterday, as Avast announced the acquisition of its competitor AVG. Both companies were founded in the Czech Republic and… https://www.virusbulletin.com/blog/2016/07/avast-acquires-avg-13bn/

Avast launches bug bounty programme

Security firm offers reward for info on bugs.
Security firm offers reward for info on bugs. Security firm Avast Software, producer of the popular avast! free anti-virus solution, has announced a bug bounty programme to… https://www.virusbulletin.com/blog/2013/01/avast-launches-bug-bounty-programme/

774,000 Avast! pirates on 14-user licence

Wildly popular free solution not good enough for some.
Wildly popular free solution not good enough for some. Leading provider of free anti-malware products Avast Software has spotted that a single 14-user licence key, issued last… https://www.virusbulletin.com/blog/2010/12/774-000-avast-pirates-14-user-licence/

Sophos joins free home AV crowd with Mac release

Business-focused firm takes first step into home-user arena.
Business-focused firm takes first step into home-user arena.Sophos has announced the release of a home-user edition of its Mac anti-malware solution, which is being given away free… https://www.virusbulletin.com/blog/2010/11/sophos-joins-free-home-av-crowd-mac-release/

Avast gets $100m investment boost

Growth equity firm invests in Czech firm
Growth equity firm invests in Czech firmAvast Software, the Czech anti-malware firm famous for its free avast! software, has announced that growth equity investor Summit Partners… https://www.virusbulletin.com/blog/2010/08/avast-gets-100m-investment-boost/

False positive problem hits avast! users

Human failure blamed for faulty update.
Human failure blamed for faulty update. A relatively small subsection of the massive user base for Alwil's ever-popular avast! products were hit by a string of false positives last… https://www.virusbulletin.com/blog/2009/12/false-positive-problem-hits-avast-users/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.