VB Blog

VB2017 preview: Beyond lexical and PDNS (guest blog)

Posted by   Virus Bulletin on   Oct 5, 2017

In a special guest blog post, VB2017 Silver sponsor Cisco Umbrella writes about a paper that researchers Dhia Mahjoub and David Rodriguez will present at the conference this Friday.

Read more  

Avast to present technical details of CCleaner hack at VB2017

Posted by   Martijn Grooten on   Oct 2, 2017

The recently discovered malicious CCleaner version has become one of the biggest security stories of 2017. Two researchers from Avast, the company that had recently acquired CCleaner developer Piriform, will share the results of their investigations at VB2017 in Madrid this week.

Read more  

VB2017 preview: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Posted by   Martijn Grooten on   Oct 2, 2017

We preview the VB2017 paper by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Costin Raiu on fourth-party collection and its implications for attack attribution.

Read more  

VB2017 preview: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Sep 29, 2017

We preview Patrick Wardle's VB2017 paper, in which the Synack researcher analyses the mysterious OSX/FruitFly malware by setting up a custom C&C server.

Read more  

VB2017 - information for press

Posted by   Martijn Grooten on   Sep 28, 2017

More than 50 security industry experts will present conference papers to their peers at VB2017 next week, and there are several papers on the programme with a certain newsworthiness. There is still time for cybersecurity journalists to apply for a press pass.

Read more  

VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

We preview the VB2017 paper by Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) who combine an actor-centric and a network-centric approach to analysing bulletproof hosting operations.

Read more  

Test your technical and mental limits in the VB2017 foosball tournament

Posted by   Martijn Grooten on   Sep 22, 2017

As has become tradition, VB2017 will once again see a security industry table football tournament. Register your team now for some great fun and adrenaline-filled matches in between sessions in Madrid!

Read more  

The case against running Windows XP is more subtle than we think it is

Posted by   Martijn Grooten on   Sep 21, 2017

Greater Manchester Police is one of many organizations still running Windows XP on some of its systems. This is bad practice, but the case against running XP is far more subtle than we often pretend it is.

Read more  

Hot FinSpy research completes VB2017 programme

Posted by   Martijn Grooten on   Sep 21, 2017

Researchers from ESET have found a new way in which the FinSpy/FinFisher 'government spyware' can infect users, details of which they will present at VB2017 in Madrid.

Read more  

Transparency is essential when monitoring your users' activities

Posted by   Virus Bulletin on   Sep 20, 2017

Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

Read more  

Search blog

Zitmo trojan for Android defeats two-factor authentication

Malware intercepts TANs sent via SMS.
Malware intercepts TANs sent via SMS. A new variant of the Zitmo trojan has been discovered that infects mobile devices running the Android platform and which intercepts SMS… https://www.virusbulletin.com/blog/2011/07/zitmo-trojan-android-defeats-two-factor-authentication/

DroidKungFu command and control server may be mobile device

Android trojan makes use of root exploit.
Android trojan makes use of root exploit. Researchers at Fortinet have discovered a command and control server for the 'DroidKungFu' Android trojan that appears to be a mobile… https://www.virusbulletin.com/blog/2011/06/droidkungfu-command-and-control-server-may-be-mobile-device/

Exploit kit targets customers of air travel websites

SpyEye configuration intercepts personal data submitted to legitimate websites.
SpyEye configuration intercepts personal data submitted to legitimate websites. Security researchers have uncovered a version of the 'SpyEye' trojan that steals credit card and… https://www.virusbulletin.com/blog/2011/06/exploit-kit-targets-customers-air-travel-websites/

Banking malware hosted on Amazon's cloud servers

Trojan targets mostly Brazilian banks.
Trojan targets mostly Brazilian banks. Researchers have discovered malware hosted on Amazon Web Services that steals victims' bank account data. Acting as a rootkit, the malware… https://www.virusbulletin.com/blog/2011/06/banking-malware-hosted-amazon-s-cloud-servers/

Spammers use unicode trick to manipulate file names

Windows executable appears to be Word document.
Windows executable appears to be Word document. An unicode trick that reverses the order of some characters has been used by spammers to disguise malicious attachments as harmless… https://www.virusbulletin.com/blog/2011/05/spammers-use-unicode-trick-manipulate-file-names/

Zeus source code leaked

Banking trojan among the most advanced of its kind.
Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to… https://www.virusbulletin.com/blog/2011/05/zeus-source-code-leaked/

Scammers take advantage of Epsilon data breach

Trojan hidden as security tool for affected customers.
Trojan hidden as security tool for affected customers. Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by… https://www.virusbulletin.com/blog/2011/04/scammers-take-advantage-epsilon-data-breach/

Ransom trojan demands Windows re-activation

Criminals make money through calls to supposedly free phone number.
Criminals make money through calls to supposedly free phone number. A new piece of ransomware has been discovered that shows the PC user a blue screen and asks them to re-activate… https://www.virusbulletin.com/blog/2011/04/ransom-trojan-demands-windows-re-activation/

'Job application' contains malicious attachment

$150,000 lost via banking trojan.
$150,000 lost via banking trojan. An unidentified US company has learned the hard way that email attachments - even to those that appear to be solicited - may contain malware. The… https://www.virusbulletin.com/blog/2011/01/job-application-contains-malicious-attachment/

Eight Zeus-related money mules arrested

Arrests in US and Moldova show that cybercriminals aren't immune to the law.
Arrests in US and Moldova show that cybercriminals aren't immune to the law. Police in the US state of Wisconsin have arrested two Moldovan citizens who they believe have worked as… https://www.virusbulletin.com/blog/2010/11/eight-zeus-related-money-mules-arrested/

Malicious tweets link to fake TweetDeck update

Twitter resets passwords for accounts that appear to have been hacked.
Twitter resets passwords for accounts that appear to have been hacked.Twitter users who recently clicked on links in tweets urging them to upgrade their version of TweetDeck - the… https://www.virusbulletin.com/blog/2010/09/malicious-tweets-link-fake-tweetdeck-update/

Android SMS trojan goes wild

Premium-rate text scam shows growing cracks in smart phone security.
Premium-rate text scam shows growing cracks in smart phone security. The first known SMS trojan affecting smart phones running Google's Android operating system has been observed… https://www.virusbulletin.com/blog/2010/08/android-sms-trojan-goes-wild/

Firefox 4 crack spreads trojan

'Cracked' versions of free software used to spread malware
'Cracked' versions of free software used to spread malware In a new malware campaign, users are told they can download a free crack of the Firefox 4 browser, only to find… https://www.virusbulletin.com/blog/2010/08/firefox-4-crack-spreads-trojan/

Out-of-band patch release from Adobe

Unscheduled update released by Adobe.
Unscheduled update released by Adobe.Adobe has released an unscheduled patch for its Reader and Acrobat programs to address some critical flaws. The software company's fixes… https://www.virusbulletin.com/blog/2010/02/out-band-patch-release-adobe/

Warrant issued for arrest of cyclist turned hacker

Cyclist accused of planting trojan at dope testing lab.
Cyclist accused of planting trojan at dope testing lab. A French judge has issued a warrant for the arrest of US cyclist Floyd Landis in connection with a computer hacking case.… https://www.virusbulletin.com/blog/2010/02/warrant-issued-arrest-cyclist-turned-hacker/

Yxe trojan infecting mobile phones

Symbian software-signing slipup certifies SMS spambot.
Symbian software-signing slipup certifies SMS spambot. A new trojan, the first of its kind, is affecting users of the Symbian mobile operating system by spreading itself via text… https://www.virusbulletin.com/blog/2009/07/yxe-trojan-infecting-mobile-phones/

Keyloggers used to loot US county

$415,000 sneaked from local government funds.
$415,000 sneaked from local government funds. A Kentucky county has suffered losses of $415,000 after keylogging malware infiltrated its computer systems, allowing cybercriminals… https://www.virusbulletin.com/blog/2009/07/keyloggers-used-loot-us-county/

Microsoft issues emergency patch

Out-of-cycle update fixes serious, wormable flaw.
Out-of-cycle update fixes serious, wormable flaw.Microsoft has issued an emergency update to cover a serious vulnerability in the Windows Server service, breaking its usual monthly… https://www.virusbulletin.com/blog/2008/10/microsoft-issues-emergency-patch/

Malware reaches space station

Autorun worm found on non-critical systems.
Autorun worm found on non-critical systems. US space agency NASA has confirmed reports that laptops in use on the international space station have been found to have been infected… https://www.virusbulletin.com/blog/2008/08/malware-reaches-space-station/

Best Western database hack exposes info on 8m customers

Hotel chain data heist latest in string of major security leaks.
Hotel chain data heist latest in string of major security leaks. The global hotel chain Best Western has had its network security breached, leading to full details of thousands of… https://www.virusbulletin.com/blog/2008/08/best-western-database-hack-exposes-info-8m-customers/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.