VB Blog

Vulnerability disclosure and botnet takedown not to be hindered by Wassenaar Arrangement

Posted by   Martijn Grooten on   Dec 19, 2017

Clarification in the language of the Wassenaar Arrangement, a multilateral export control regime for conventional arms and dual-use goods and technologies, means those involved in vulnerability disclosure or botnet takedown won't have to worry about acquiring an export licence.

Read more  

VB2017 paper: Nine circles of Cerber

Posted by   Martijn Grooten on   Dec 15, 2017

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool worked; we have also uploaded the video of the presentation of this paper, by Or Eshed and Yaniv Balmas.

Read more  

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Posted by   Martijn Grooten on   Dec 14, 2017

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Read more  

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

Posted by   Martijn Grooten on   Dec 14, 2017

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Read more  

Security Planner gives security advice based on your threat model

Posted by   Martijn Grooten on   Dec 13, 2017

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

Read more  

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Posted by   Martijn Grooten on   Dec 11, 2017

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.

Read more  

VB2017 paper: Modern reconnaissance phase on APT – protection layer

Posted by   Martijn Grooten on   Dec 7, 2017

During recent research, Cisco Talos researchers observed the ways in which APT actors are evolving and how a reconnaissance phase is included in the infection vector in order to protect valuable zero-day exploits or malware frameworks. At VB2017 in Madrid, two of those researchers, Paul Rascagneres and Warren Mercer, presented a paper detailing five case studies that demonstrate how the infection vector is evolving. Today we publish both Paul and Warren's paper and the recording of their presentation.

Read more  

VB2017 paper: Peering into spam botnets

Posted by   Martijn Grooten on   Dec 1, 2017

At VB2017 in Madrid, CERT Poland researchers Maciej Kotowicz and Jarosław Jedynak presented a paper detailing their low-level analysis of five spam botnets. Today we publish their full paper.

Read more  

Throwback Thursday: Anti-malware testing undercover

Posted by   Martijn Grooten on   Nov 30, 2017

We look back at the VB2016 presentation by Righard Zwienenberg (ESET) and Luis Corrons (Panda Security), in which they discussed various issues relating to anti-malware testing.

Read more  

Virus Bulletin relaunches VB Security Jobs Market for both employers and job seekers

Posted by   Martijn Grooten on   Nov 30, 2017

As an independent body in the IT security industry, Virus Bulletin is in an ideal position to act as a global source of information both about jobs currently available in the field and about those candidates currently seeking to start or progress their career in the industry - which is why we have relaunched the VB Security Jobs Market.

Read more  

Search blog

Showy malware pushes rogue anti-malware product

MonaRonaDona trojan leads searchers to remover scam.
MonaRonaDona trojan leads searchers to remover scam. An infection which advertises its presence using the name 'MonaRonaDona' is leading victims to search for a cure - and many of… https://www.virusbulletin.com/blog/2008/03/showy-malware-pushes-rogue-anti-malware-product/

Cybercriminals charged in New Zealand, Korea

Law closes in on alleged botnet master and rogue anti-spyware maker.
Law closes in on alleged botnet master and rogue anti-spyware maker. Police in New Zealand have charged an 18-year-old in connection with a botnet he is suspected of building and… https://www.virusbulletin.com/blog/2008/03/cybercriminals-charged-new-zealand-korea/

Botnet-herding team arrested in Quebec

Gang held for managing million-machine zombie net.
Gang held for managing million-machine zombie net. Canadian police have announced the arrests of up to 17 people in Quebec, in connection with a major botnet operation thought to… https://www.virusbulletin.com/blog/2008/02/botnet-herding-team-arrested-quebec/

Phishers phishing phishers' phishes

Scam software secretly sending stolen data to creators.
Scam software secretly sending stolen data to creators.Phishing researchers have uncovered code buried in phishing software kits, sold by developers to less technically aware… https://www.virusbulletin.com/blog/2008/02/phishers-phishing-phishers-phishes/

419 scammers plead guilty in US

African trio admit attempts to defraud via spam.
African trio admit attempts to defraud via spam. Three men, two from Nigeria and a third from Senegal, entered guilty pleas in a Brooklyn, New York, courtroom last week after being… https://www.virusbulletin.com/blog/2008/02/419-scammers-plead-guilty-us/

US agencies report vishing, extortion, danger of hacking

FBI name used in email attacks, CIA warns of power supply hacks.
FBI name used in email attacks, CIA warns of power supply hacks. US security and law enforcement agencies were more than usually active in the computer security world last week,… https://www.virusbulletin.com/blog/2008/01/us-agencies-report-vishing-extortion-danger-hacking/

Google links scam Avira users

Suspect firm advertising via Google found to be specialising in hijacking security brands.
Suspect firm advertising via Google found to be specialising in hijacking security brands.Google searches for Avira and the company's anti-malware product Antivir, a free version… https://www.virusbulletin.com/blog/2008/01/google-links-scam-avira-users/

Malcode from Mexico and Africa predicted to boom

Developing world expected to contribute heavily to future cybercrime.
Developing world expected to contribute heavily to future cybercrime. A report from F-Secure has predicted increasing levels of malware creation and operation in 'developing'… https://www.virusbulletin.com/blog/2008/01/malcode-mexico-and-africa-predicted-boom/

Microsoft alert on Excel vulnerability

Targeted exploitation of zero-day flaw seen in wild.
Targeted exploitation of zero-day flaw seen in wild.Microsoft has issued a security advisory on an unresolved vulnerability in its Excel software, which has been reported as a… https://www.virusbulletin.com/blog/2008/01/microsoft-alert-excel-vulnerability/

Help for victims of e-crime

Cybercrime support website launched.
Cybercrime support website launched. A website dedicated to helping victims of online crime and other incidents has been launched in the UK. The site, www.e-victims.org, aims to… https://www.virusbulletin.com/blog/2008/01/help-victims-e-crime/

Botnet roasting on an open fire

FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008.
FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008. The FBI has revealed that eight individuals have been indicted, pled guilty or been… https://www.virusbulletin.com/blog/2007/12/botnet-roasting-open-fire/

Teenage botherder arrested in New Zealand

International cooperation also leads to eight arrests in the US.
International cooperation also leads to eight arrests in the US. Police in New Zealand have arrested an 18-year-old youth believed to be the herder of a botnet of 1.3 million… https://www.virusbulletin.com/blog/2007/11/teenage-botherder-arrested-new-zealand/

Russian Business Network leaves Russia

Leading cybercrime hosting hub moves business to fresh pastures.
Leading cybercrime hosting hub moves business to fresh pastures. The notorious Russian Business Network (RBN), recently making headlines for the massive amounts of malicious and… https://www.virusbulletin.com/blog/2007/11/russian-business-network-leaves-russia/

E-crime unit to get government funding?

UK government responds to House of Lords call for better policing of the Internet.
UK government responds to House of Lords call for better policing of the Internet. The UK government has indicated that it may set up a new national police unit dedicated to… https://www.virusbulletin.com/blog/2007/11/e-crime-unit-get-government-funding/

Bulletproof hosting firm claims legitimacy

Crime-laden Russian service threatens to sue detractors.
Crime-laden Russian service threatens to sue detractors. A notorious Russian firm offering 'bulletproof hosting' - website hosting services with a guarantee that sites will not be… https://www.virusbulletin.com/blog/2007/10/bulletproof-hosting-firm-claims-legitimacy/

Cybercrime rivals real-world crime rates

Researchers estimate 3 million online crimes committed in UK last year.
Researchers estimate 3 million online crimes committed in UK last year. A research group has issued a report estimating levels of cybercrime in the UK during 2006, finding that an… https://www.virusbulletin.com/blog/2007/09/cybercrime-rivals-real-world-crime-rates/

FBI-led panel to provide insight into international fight against cybercrime

International law enforcement agencies set to join forces at VB2007 in Vienna.
International law enforcement agencies set to join forces at VB2007 in Vienna. International law enforcement agencies are set to join forces at the VB2007 anti-malware conference… https://www.virusbulletin.com/blog/2007/08/fbi-led-panel-provide-insight-international-fight-against-cybercrime/

« Previous 123 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.