VB Blog

VB2017 video: Turning Trickbot: decoding an encrypted command-and-control channel

Posted by   Martijn Grooten on   Nov 3, 2017

Trickbot, a banking trojan which appeared this year, seems to be a new, more modular, and more extensible malware descendant of the notorious Dyre botnet trojan. At VB2017, Symantec researcher Andrew Brandt presented a walkthrough of a typical Trickbot infection process, and its aftermath, as seen through the lens of a tool used to perform man-in-the-middle decryption. Today, we publish both Andrew's slides and the recording of his presentation.

Read more  

Paper: FAME - Friendly Malware Analysis Framework

Posted by   Martijn Grooten on   Nov 2, 2017

Today, we publish a short paper in which CERT Société Générale presents FAME, its open source malware analysis framework.

Read more  

Ebury and Mayhem server malware families still active

Posted by   Martijn Grooten on   Oct 31, 2017

Ebury and Mayhem, two families of Linux server malware, about which VB published papers back in 2014, are still active and have received recent updates.

Read more  

VB2017 paper: Crypton - exposing malware's deepest secrets

Posted by   Martijn Grooten on   Oct 27, 2017

Crypton, a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, aims to speed up the reverse engineering process by decrypting encrypted content found in a (malicious) binary. The researchers described the tool in a paper which they presented at VB2017 in Madrid. Today, we publish both the paper and the recording of their presentation.

Read more  

VB2017 paper: The sprawling market of consumer spyware

Posted by   Martijn Grooten on   Oct 25, 2017

For many people, the threat of an abusive partner or ex-partner is very real - and the market for consumer spyware worryingly large. Today, we publish the recording of a presentation on the subject of consumer spyware given at VB2017 by The Daily Beast reporter Joseph Cox.

Read more  

Gábor Szappanos wins fourth Péter Szőr Award

Posted by   Martijn Grooten on   Oct 23, 2017

At the VB2017 gala dinner, the fourth Péter Szőr Award was presented to Sophos researcher Gábor Szappanos for his paper "AKBuilder – the crowdsourced exploit kit".

Read more  

VB2017 paper: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Posted by   Martijn Grooten on   Oct 20, 2017

We publish the VB2017 paper and video by Kaspersky Lab researchers Juan Andres Guerrero-Saade and Costin Raiu, in which they look at fourth-party collection (spies spying on other spies' campaigns) and its implications for attribution.

Read more  

Didn't come to VB2017? Tell us why!

Posted by   Martijn Grooten on   Oct 11, 2017

Virus Bulletin is a company - and a conference - with a mission: to further the research in and facilitate the fight against digital threats. To help us in this mission, we want to hear from those who didn't come to Madrid. What is your impression of the VB Conference? What did you think of this year's programme? And why couldn't you come to Madrid?

Read more  

Montreal will host VB2018

Posted by   Martijn Grooten on   Oct 10, 2017

Last week, we announced the full details of VB2018, which will take place 3-5 October 2018 at the Fairmont The Queen Elizabeth hotel in Montreal, Quebec, Canada.

Read more  

VB2017 preview: Beyond lexical and PDNS (guest blog)

Posted by   Virus Bulletin on   Oct 5, 2017

In a special guest blog post, VB2017 Silver sponsor Cisco Umbrella writes about a paper that researchers Dhia Mahjoub and David Rodriguez will present at the conference this Friday.

Read more  

Search blog

Zitmo trojan for Android defeats two-factor authentication

Malware intercepts TANs sent via SMS.
Malware intercepts TANs sent via SMS. A new variant of the Zitmo trojan has been discovered that infects mobile devices running the Android platform and which intercepts SMS… https://www.virusbulletin.com/blog/2011/07/zitmo-trojan-android-defeats-two-factor-authentication/

DroidKungFu command and control server may be mobile device

Android trojan makes use of root exploit.
Android trojan makes use of root exploit. Researchers at Fortinet have discovered a command and control server for the 'DroidKungFu' Android trojan that appears to be a mobile… https://www.virusbulletin.com/blog/2011/06/droidkungfu-command-and-control-server-may-be-mobile-device/

Exploit kit targets customers of air travel websites

SpyEye configuration intercepts personal data submitted to legitimate websites.
SpyEye configuration intercepts personal data submitted to legitimate websites. Security researchers have uncovered a version of the 'SpyEye' trojan that steals credit card and… https://www.virusbulletin.com/blog/2011/06/exploit-kit-targets-customers-air-travel-websites/

Banking malware hosted on Amazon's cloud servers

Trojan targets mostly Brazilian banks.
Trojan targets mostly Brazilian banks. Researchers have discovered malware hosted on Amazon Web Services that steals victims' bank account data. Acting as a rootkit, the malware… https://www.virusbulletin.com/blog/2011/06/banking-malware-hosted-amazon-s-cloud-servers/

Spammers use unicode trick to manipulate file names

Windows executable appears to be Word document.
Windows executable appears to be Word document. An unicode trick that reverses the order of some characters has been used by spammers to disguise malicious attachments as harmless… https://www.virusbulletin.com/blog/2011/05/spammers-use-unicode-trick-manipulate-file-names/

Zeus source code leaked

Banking trojan among the most advanced of its kind.
Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to… https://www.virusbulletin.com/blog/2011/05/zeus-source-code-leaked/

Scammers take advantage of Epsilon data breach

Trojan hidden as security tool for affected customers.
Trojan hidden as security tool for affected customers. Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by… https://www.virusbulletin.com/blog/2011/04/scammers-take-advantage-epsilon-data-breach/

Ransom trojan demands Windows re-activation

Criminals make money through calls to supposedly free phone number.
Criminals make money through calls to supposedly free phone number. A new piece of ransomware has been discovered that shows the PC user a blue screen and asks them to re-activate… https://www.virusbulletin.com/blog/2011/04/ransom-trojan-demands-windows-re-activation/

'Job application' contains malicious attachment

$150,000 lost via banking trojan.
$150,000 lost via banking trojan. An unidentified US company has learned the hard way that email attachments - even to those that appear to be solicited - may contain malware. The… https://www.virusbulletin.com/blog/2011/01/job-application-contains-malicious-attachment/

Eight Zeus-related money mules arrested

Arrests in US and Moldova show that cybercriminals aren't immune to the law.
Arrests in US and Moldova show that cybercriminals aren't immune to the law. Police in the US state of Wisconsin have arrested two Moldovan citizens who they believe have worked as… https://www.virusbulletin.com/blog/2010/11/eight-zeus-related-money-mules-arrested/

Malicious tweets link to fake TweetDeck update

Twitter resets passwords for accounts that appear to have been hacked.
Twitter resets passwords for accounts that appear to have been hacked.Twitter users who recently clicked on links in tweets urging them to upgrade their version of TweetDeck - the… https://www.virusbulletin.com/blog/2010/09/malicious-tweets-link-fake-tweetdeck-update/

Android SMS trojan goes wild

Premium-rate text scam shows growing cracks in smart phone security.
Premium-rate text scam shows growing cracks in smart phone security. The first known SMS trojan affecting smart phones running Google's Android operating system has been observed… https://www.virusbulletin.com/blog/2010/08/android-sms-trojan-goes-wild/

Firefox 4 crack spreads trojan

'Cracked' versions of free software used to spread malware
'Cracked' versions of free software used to spread malware In a new malware campaign, users are told they can download a free crack of the Firefox 4 browser, only to find… https://www.virusbulletin.com/blog/2010/08/firefox-4-crack-spreads-trojan/

Out-of-band patch release from Adobe

Unscheduled update released by Adobe.
Unscheduled update released by Adobe.Adobe has released an unscheduled patch for its Reader and Acrobat programs to address some critical flaws. The software company's fixes… https://www.virusbulletin.com/blog/2010/02/out-band-patch-release-adobe/

Warrant issued for arrest of cyclist turned hacker

Cyclist accused of planting trojan at dope testing lab.
Cyclist accused of planting trojan at dope testing lab. A French judge has issued a warrant for the arrest of US cyclist Floyd Landis in connection with a computer hacking case.… https://www.virusbulletin.com/blog/2010/02/warrant-issued-arrest-cyclist-turned-hacker/

Yxe trojan infecting mobile phones

Symbian software-signing slipup certifies SMS spambot.
Symbian software-signing slipup certifies SMS spambot. A new trojan, the first of its kind, is affecting users of the Symbian mobile operating system by spreading itself via text… https://www.virusbulletin.com/blog/2009/07/yxe-trojan-infecting-mobile-phones/

Keyloggers used to loot US county

$415,000 sneaked from local government funds.
$415,000 sneaked from local government funds. A Kentucky county has suffered losses of $415,000 after keylogging malware infiltrated its computer systems, allowing cybercriminals… https://www.virusbulletin.com/blog/2009/07/keyloggers-used-loot-us-county/

Microsoft issues emergency patch

Out-of-cycle update fixes serious, wormable flaw.
Out-of-cycle update fixes serious, wormable flaw.Microsoft has issued an emergency update to cover a serious vulnerability in the Windows Server service, breaking its usual monthly… https://www.virusbulletin.com/blog/2008/10/microsoft-issues-emergency-patch/

Malware reaches space station

Autorun worm found on non-critical systems.
Autorun worm found on non-critical systems. US space agency NASA has confirmed reports that laptops in use on the international space station have been found to have been infected… https://www.virusbulletin.com/blog/2008/08/malware-reaches-space-station/

Best Western database hack exposes info on 8m customers

Hotel chain data heist latest in string of major security leaks.
Hotel chain data heist latest in string of major security leaks. The global hotel chain Best Western has had its network security breached, leading to full details of thousands of… https://www.virusbulletin.com/blog/2008/08/best-western-database-hack-exposes-info-8m-customers/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.