VB Blog

Dutch ISP sues Spamhaus for 'extortion'

Posted by   Virus Bulletin on   Oct 13, 2011

Blacklist entries 'unfair and illegal'.

Read more  

Google AdWords phishing campaign spreads

Posted by   Virus Bulletin on   Oct 13, 2011

Users urged to login because of 'issues'.

Read more  

Mac trojan is VMware-aware

Posted by   Virus Bulletin on   Oct 12, 2011

Malicious execution stopped when virtual environment is detected.

Read more  

Government trojan found on German computers

Posted by   Virus Bulletin on   Oct 11, 2011

Four states admit the use of spyware.

Read more  

VB conference hashtag used to spread malware

Posted by   Virus Bulletin on   Oct 11, 2011

Tweet promising conference news links to trojan.

Read more  

October issue of VB published

Posted by   Virus Bulletin on   Oct 1, 2011

The October issue of Virus Bulletin is now available for subscribers to download.

Read more  

Mysql.com hacked, serving malware

Posted by   Virus Bulletin on   Sep 27, 2011

Root access to site offered on black market.

Read more  

E-marketing companies compromised to send spam

Posted by   Virus Bulletin on   Sep 27, 2011

Fake order confirmations contain malicious links.

Read more  

Alureon trojan uses steganography to receive commands

Posted by   Virus Bulletin on   Sep 26, 2011

Messages hidden inside images create extra layer of redundancy.

Read more  

Attack targets government agencies in CIS countries

Posted by   Virus Bulletin on   Sep 26, 2011

Trojans used to steal specific files.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.