VB Blog

VB2016 paper: Open Source Malware Lab

Posted by   Martijn Grooten on   Jan 4, 2017

At VB2016, ThreatConnect Director of Research Innovation Robert Simmons presented a paper on setting up an open source malware lab. Today, we share the accompanying paper and video.

Read more  

A Christmas present for the security community

Posted by   Martijn Grooten on   Dec 24, 2016

As a Christmas present for the security community, we have uploaded most of the papers and videos from the VB2015 conference which took place in Prague almost 15 months ago. The Virus Bulletin crew wishes you all the best for 2017!

Read more  

Paper: Spreading techniques used by malware

Posted by   Martijn Grooten on   Dec 21, 2016

In a new paper published by Virus Bulletin, Acalvio researcher Abhishek Singh discusses some of the techniques used by malware to increase its impact by spreading further.

Read more  

VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users

Posted by   Martijn Grooten on   Dec 20, 2016

At VB2016, Kaspersky Lab researcher Kurt Baumgartner delivered a presentation on the StrongPity watering hole attacks that targeted users of encryption technologies, and which were recently featured in a report by Microsoft. Today, we share the video of Kurt's presentation.

Read more  

Conference review: Botconf 2016

Posted by   Martijn Grooten on   Dec 20, 2016

Three members of the Virus Bulletin team attended the Botconf 2016 conference in Lyon, France last month, enjoying talks on subjects that ranged from state-sponsored attacks to exploit kits, and from banking trojans to cyber insurance.

Read more  

Throwback Thursday: Adjust Your Attitude!

Posted by   Helen Martin on   Dec 15, 2016

"Most of you reading this article have the technical skill but do you have the people skills?" In 2000, James Wolfe urged security experts to sell themselves and their services.

Read more  

VB2016 paper: Modern attacks on Russian financial institutions

Posted by   Martijn Grooten on   Dec 12, 2016

Today, we publish the VB2016 paper and presentation (recording) by ESET researchers Jean-Ian Boutin and Anton Cherepanov, in which they look at sophisticated attacks against Russian financial institutions.

Read more  

More on the Moose botnet at Botconf

Posted by   Martijn Grooten on   Dec 2, 2016

At Botconf 2016 this week, GoSecure researchers Masarah Paquet-Clouston and Olivier Bilodeau presented their research on the Moose botnet - something Olivier Bilodeau previously spoke about at VB2015.

Read more  

VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment

Posted by   Martijn Grooten on   Dec 2, 2016

Today, we publish the VB2016 paper and presentation (recording) by Check Point Software researchers Alexander Chailytko and Stanislav Skuratovich, which focuses on the techniques used by malware to detect virtual environments, and provides detailed technical descriptions of what can be done to defeat them.

Read more  

VB2016 paper: Mobile applications: a backdoor into the Internet of Things?

Posted by   Martijn Grooten on   Nov 29, 2016

While the Internet of Things blossoms with newly connected objects every day, the security and privacy of these objects is often overlooked, making the IoT a major security concern. Unfortunately, reverse-engineering so-called smart devices is not an easy task. In her VB2016 paper, Axelle Apvrille presented a novel way of analysing smart devices: by looking at the accompanying mobile app. Today, we publish both Axelle’s paper and the video recording of her VB2016 presentation.

Read more  

Search blog

Cybercriminals charged in New Zealand, Korea

Law closes in on alleged botnet master and rogue anti-spyware maker.
Law closes in on alleged botnet master and rogue anti-spyware maker. Police in New Zealand have charged an 18-year-old in connection with a botnet he is suspected of building and… https://www.virusbulletin.com/blog/2008/03/cybercriminals-charged-new-zealand-korea/

Showy malware pushes rogue anti-malware product

MonaRonaDona trojan leads searchers to remover scam.
MonaRonaDona trojan leads searchers to remover scam. An infection which advertises its presence using the name 'MonaRonaDona' is leading victims to search for a cure - and many of… https://www.virusbulletin.com/blog/2008/03/showy-malware-pushes-rogue-anti-malware-product/

Botnet-herding team arrested in Quebec

Gang held for managing million-machine zombie net.
Gang held for managing million-machine zombie net. Canadian police have announced the arrests of up to 17 people in Quebec, in connection with a major botnet operation thought to… https://www.virusbulletin.com/blog/2008/02/botnet-herding-team-arrested-quebec/

Phishers phishing phishers' phishes

Scam software secretly sending stolen data to creators.
Scam software secretly sending stolen data to creators.Phishing researchers have uncovered code buried in phishing software kits, sold by developers to less technically aware… https://www.virusbulletin.com/blog/2008/02/phishers-phishing-phishers-phishes/

419 scammers plead guilty in US

African trio admit attempts to defraud via spam.
African trio admit attempts to defraud via spam. Three men, two from Nigeria and a third from Senegal, entered guilty pleas in a Brooklyn, New York, courtroom last week after being… https://www.virusbulletin.com/blog/2008/02/419-scammers-plead-guilty-us/

Google links scam Avira users

Suspect firm advertising via Google found to be specialising in hijacking security brands.
Suspect firm advertising via Google found to be specialising in hijacking security brands.Google searches for Avira and the company's anti-malware product Antivir, a free version… https://www.virusbulletin.com/blog/2008/01/google-links-scam-avira-users/

US agencies report vishing, extortion, danger of hacking

FBI name used in email attacks, CIA warns of power supply hacks.
FBI name used in email attacks, CIA warns of power supply hacks. US security and law enforcement agencies were more than usually active in the computer security world last week,… https://www.virusbulletin.com/blog/2008/01/us-agencies-report-vishing-extortion-danger-hacking/

Microsoft alert on Excel vulnerability

Targeted exploitation of zero-day flaw seen in wild.
Targeted exploitation of zero-day flaw seen in wild.Microsoft has issued a security advisory on an unresolved vulnerability in its Excel software, which has been reported as a… https://www.virusbulletin.com/blog/2008/01/microsoft-alert-excel-vulnerability/

Help for victims of e-crime

Cybercrime support website launched.
Cybercrime support website launched. A website dedicated to helping victims of online crime and other incidents has been launched in the UK. The site, www.e-victims.org, aims to… https://www.virusbulletin.com/blog/2008/01/help-victims-e-crime/

Malcode from Mexico and Africa predicted to boom

Developing world expected to contribute heavily to future cybercrime.
Developing world expected to contribute heavily to future cybercrime. A report from F-Secure has predicted increasing levels of malware creation and operation in 'developing'… https://www.virusbulletin.com/blog/2008/01/malcode-mexico-and-africa-predicted-boom/

Botnet roasting on an open fire

FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008.
FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008. The FBI has revealed that eight individuals have been indicted, pled guilty or been… https://www.virusbulletin.com/blog/2007/12/botnet-roasting-open-fire/

Teenage botherder arrested in New Zealand

International cooperation also leads to eight arrests in the US.
International cooperation also leads to eight arrests in the US. Police in New Zealand have arrested an 18-year-old youth believed to be the herder of a botnet of 1.3 million… https://www.virusbulletin.com/blog/2007/11/teenage-botherder-arrested-new-zealand/

Russian Business Network leaves Russia

Leading cybercrime hosting hub moves business to fresh pastures.
Leading cybercrime hosting hub moves business to fresh pastures. The notorious Russian Business Network (RBN), recently making headlines for the massive amounts of malicious and… https://www.virusbulletin.com/blog/2007/11/russian-business-network-leaves-russia/

E-crime unit to get government funding?

UK government responds to House of Lords call for better policing of the Internet.
UK government responds to House of Lords call for better policing of the Internet. The UK government has indicated that it may set up a new national police unit dedicated to… https://www.virusbulletin.com/blog/2007/11/e-crime-unit-get-government-funding/

Bulletproof hosting firm claims legitimacy

Crime-laden Russian service threatens to sue detractors.
Crime-laden Russian service threatens to sue detractors. A notorious Russian firm offering 'bulletproof hosting' - website hosting services with a guarantee that sites will not be… https://www.virusbulletin.com/blog/2007/10/bulletproof-hosting-firm-claims-legitimacy/

Cybercrime rivals real-world crime rates

Researchers estimate 3 million online crimes committed in UK last year.
Researchers estimate 3 million online crimes committed in UK last year. A research group has issued a report estimating levels of cybercrime in the UK during 2006, finding that an… https://www.virusbulletin.com/blog/2007/09/cybercrime-rivals-real-world-crime-rates/

FBI-led panel to provide insight into international fight against cybercrime

International law enforcement agencies set to join forces at VB2007 in Vienna.
International law enforcement agencies set to join forces at VB2007 in Vienna. International law enforcement agencies are set to join forces at the VB2007 anti-malware conference… https://www.virusbulletin.com/blog/2007/08/fbi-led-panel-provide-insight-international-fight-against-cybercrime/

« Previous 123 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.