VB Blog

VB2019 paper: Why companies need to focus on a problem they do not know they have

Posted by   Virus Bulletin on   Mar 20, 2020

Often unbeknownst to network administrators, many company networks are used to download child sexual abuse material. In a paper presented at VB2019 in London, NetClean’s Richard Matti and Anna Creutz looked at this problem and what companies can do, ultimately, to help safeguard children. Today we publish their full paper.

Read more  

VB2020 update - currently business as usual

Posted by   Virus Bulletin on   Mar 16, 2020

Here at VB we are keeping a close eye on the global situation regarding the COVID-19 outbreak and the various travel restrictions and health advice, but in the meantime planning and arrangements for VB2020 are going ahead as usual, including the selection of papers.

Read more  

VB2019 paper: Defeating APT10 compiler-level obfuscations

Posted by   Virus Bulletin on   Mar 13, 2020

At VB2019 in London, Carbon Black researcher Takahiro Haruyama presented a paper on defeating compiler-level obfuscations used by the APT10 group. Today we publish both Takahiro's paper and the recording of his presentation.

Read more  

VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

Posted by   Virus Bulletin on   Mar 12, 2020

At VB2019 in London Michael Raggi (Proofpoint) and Ghareeb Saad (Anomali) presented a paper on the 'Royal Road' exploit builder (or weaponizer) and how the properties of RTF files can be used to track weaponizers and their users. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 presentation: Nexus between OT and IT threat intelligence

Posted by   Virus Bulletin on   Mar 11, 2020

Operational technology, the mission critical IT in ICS, shares many similarities with traditional IT systems, but also some crucial differences. During the Threat Intelligence Practitioners’ Summit at VB2019, Dragos cyber threat intelligence analyst Selena Larson gave a keynote on these similarities and differences. Today we release the recording of her presentation.

Read more  

VB2019 paper: Kimsuky group: tracking the king of the spear-phishing

Posted by   Virus Bulletin on   Mar 10, 2020

In a paper presented at VB2019 in London, researchers fron the Financial Security Institute detailed the tools and activities used by the APT group 'Kimsuky', some of which they were able to analyse through OpSec failures by the group. Today, we publish their paper.

Read more  

VB2019 paper: Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly

Posted by   Virus Bulletin on   Mar 9, 2020

In a paper presented at VB2019 in London, Trend Micro researchers Lilang Wu and Moony Li explained how the hunt for vulnerabilities in MacOS and iOS operating systems can be made both smarter and more automatic. Today we publish both their paper and the recording of their presentation.

Read more  

VB2019 paper: Finding drive-by rookies using an automated active observation platform

Posted by   Virus Bulletin on   Mar 6, 2020

In a last-minute paper presented at VB2019 in London, Rintaro Koike (NTT Security) and Yosuke Chubachi (Active Defense Institute, Ltd) discussed the platform they have built to automatically detect and analyse exploit kits. Today we publish the recording of their presentation.

Read more  

VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation state adversary

Posted by   Virus Bulletin on   Feb 28, 2020

The activities of China-based threat actor PKPLUG were detailed in a VB2019 paper by Palo Alto Networks researcher Alex Hinchliffe, who described the playbook of this long-standing adversary. Today we publish both Alex's paper and the recording of his presentation.

Read more  

VB2019 paper: Static analysis methods for detection of Microsoft Office exploits

Posted by   Virus Bulletin on   Feb 25, 2020

Today we publish the VB2019 paper and presentation by McAfee researcher Chintan Shah in which he described static analysis methods for the detection of Microsoft Office exploits.

Read more  

Search blog

Worm trashes music files

MP3s targeted for destruction.
MP3s targeted for destruction. A new worm has been spotted attempting to delete .mp3 music files from infected systems and attached devices. Once a machine is compromised, the… https://www.virusbulletin.com/blog/2007/08/worm-trashes-music-files/

Trojans and worms hiding behind games

Mario latest lure to hook victims on malware.
Mario latest lure to hook victims on malware. Social engineering techniques used to trick computer users into running malicious code on their systems concentrate around simple… https://www.virusbulletin.com/blog/2007/08/trojans-and-worms-hiding-behind-games/

Spreadsheets latest spam message carriers

XLS files follow PDFs as junk email ad vector.
XLS files follow PDFs as junk email ad vector. After the image spam deluge and the recent wave of spams carrying their messages in PDF files, the latest trend seems to be… https://www.virusbulletin.com/blog/2007/07/spreadsheets-latest-spam-message-carriers/

Series of products hit by vulnerabilities

Researcher finds flaws in ESET, Panda and Norman AV software.
Researcher finds flaws in ESET, Panda and Norman AV software. Researcher Sergio Alvarez has reported on vulnerabilities found in a string of anti-virus products this week, with… https://www.virusbulletin.com/blog/2007/07/series-products-hit-vulnerabilities/

VB2007 - call for last-minute presentations

Virus Bulletin is seeking submissions from those wishing to present last-minute technical papers at VB2007 in Vienna.
Virus Bulletin is seeking submissions from those wishing to present last-minute technical papers at VB2007 in Vienna. Virus Bulletin is seeking submissions from those wishing to… https://www.virusbulletin.com/blog/2007/07/call-last-minute-presentations/

Study promotes challenge-response for anti-spam

Interactive system rated best blocker in questioned survey.
Interactive system rated best blocker in questioned survey. A study of anti-spam systems, using a bespoke scale to rate protection offered, has found the challenge-response method… https://www.virusbulletin.com/blog/2007/07/study-promotes-challenge-response-anti-spam/

Ransomware returns

Trojan hides personal data, demands money with menaces.
Trojan hides personal data, demands money with menaces. A new version of a ransomware trojan has been sighted, recalling the warnings of two years ago when similar items first… https://www.virusbulletin.com/blog/2007/07/ransomware-returns/

MessageLabs may be next takeover target

Managed services provider thought ripe for acquisition.
Managed services provider thought ripe for acquisition. Managed security specialist MessageLabs has been labelled a likely candidate for takeover by one of the industry giants, in… https://www.virusbulletin.com/blog/2007/07/messagelabs-may-be-next-takeover-target/

Microsoft files adware system patent

Ads could be targeted at users based on local system data.
Ads could be targeted at users based on local system data.Microsoft has filed a patent application for a new method of targeting advertising, using information on the contents of a… https://www.virusbulletin.com/blog/2007/07/microsoft-files-adware-system-patent/

Japan to tighten spam laws

Proposals to further restrict email and phone spamming.
Proposals to further restrict email and phone spamming. The Japanese Internal Affairs and Communications Ministry is planning a series of improvements to current anti-spam… https://www.virusbulletin.com/blog/2007/07/japan-tighten-spam-laws/

26 phishing arrests in Italy

Police swoop on Poste Italiane spam scam gangs.
Police swoop on Poste Italiane spam scam gangs. In a first for Italy, the Guardia Di Finanza has made 26 arrests from two separate groups of phishing fraudsters, in the culmination… https://www.virusbulletin.com/blog/2007/07/26-phishing-arrests-italy/

Security industry future looks solid, say analysts

Reports predict revenues will continue rising.
Reports predict revenues will continue rising. Analyst firm Global Industry Analysts (GIA) has released its latest report on the future of the IT security market, predicting… https://www.virusbulletin.com/blog/2007/07/security-industry-future-looks-solid-say-analysts/

Sony sues maker of MediaMax DRM system

CD protection developer accused of damaging Sony name.
CD protection developer accused of damaging Sony name.Sony BMG, the division of the Sony group embroiled in a long-running scandal after releasing a number of CDs using suspect… https://www.virusbulletin.com/blog/2007/07/sony-sues-maker-mediamax-drm-system/

Symantec, AVG suffer problems

Vulnerabilities and false positives strike major products.
Vulnerabilities and false positives strike major products.Symantec users have been warned of some serious issues with archive handling, across a wide range of software produced by… https://www.virusbulletin.com/blog/2007/07/symantec-avg-suffer-problems/

Microsoft opens security 'portal'

New site carries prevalence data, updates and malware resources.
New site carries prevalence data, updates and malware resources. Security teams at Microsoft have been busy this week, with the full unveiling of the Microsoft Malware Protection… https://www.virusbulletin.com/blog/2007/07/microsoft-opens-security-portal/

7 flaws fixed in July Patch Tuesday release

Critical patches issued for Excel, Active Directory and .NET.
Critical patches issued for Excel, Active Directory and .NET.Microsoft has released a total of seven patches in its monthly 'Patch Tuesday' security update, with three of the… https://www.virusbulletin.com/blog/2007/07/7-flaws-fixed-july-patch-tuesday-release/

SEC brings case against pump-and-dump spammers

Scam spotted after spammed mail sent to SEC lawyer.
Scam spotted after spammed mail sent to SEC lawyer. Two men from Texas have been charged with a range of spam and fraud offences after a 20-month campaign using botnets to spam… https://www.virusbulletin.com/blog/2007/07/sec-brings-case-against-pump-and-dump-spammers/

Controversy over IE-to-Firefox exploit

MS and Mozilla in row over blame for cross-browser attack.
MS and Mozilla in row over blame for cross-browser attack. An exploit which involves browsing to a malicious website using Internet Explorer, but then launches an attack via a… https://www.virusbulletin.com/blog/2007/07/controversy-over-ie-firefox-exploit/

Spoof Spamhaus ads spammed out

Mail campaign claims to promote spam fighters.
Mail campaign claims to promote spam fighters. Spam-fighting organisation Spamhaus has been subjected to an attack on its reputation this week, with a sizeable campaign of spams… https://www.virusbulletin.com/blog/2007/07/spoof-spamhaus-ads-spammed-out/

Google buys Postini

Managed security service snapped up by giant.
Managed security service snapped up by giant. Ever-expanding web giant Google has continued its growth into both security and software-as-service spheres with the $625 million… https://www.virusbulletin.com/blog/2007/07/google-buys-postini/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.