VB Blog

VB2017 paper: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Nov 29, 2017

At VB2017 in Madrid, macOS malware researcher Patrick Wardle presented the details of a specific piece of Mac malware, FruitFly, which he analysed through a custom C&C server - a technique that will also be of interest for researchers of malware on other platforms. Today we publish both Patrick's paper and the recording of his presentation.

Read more  

Tizi Android malware highlights the importance of security patches for high-risk users

Posted by   Martijn Grooten on   Nov 28, 2017

Researchers from Google have taken down 'Tizi', an Android malware family, that used nine already patched vulnerabilities to obtain root on infected devices.

Read more  

Virus Bulletin to attend AMTSO, AVAR and Botconf

Posted by   Martijn Grooten on   Nov 27, 2017

Next week, Virus Bulletin researchers will be attending the AMTSO meeting and AVAR conference in Beijing, China, as well as the 5th edition of the Botconf conference in Montpellier, France.

Read more  

VB2017 video: FinFisher: New techniques and infection vectors revealed

Posted by   Martijn Grooten on   Nov 24, 2017

Today, we publish the video of the VB2017 presentation by ESET researcher Filip Kafka, who looked at recent changes in the FinFisher government malware, including its infection vectors.

Read more  

Throwback Thursday: The beginning of the end(point): where we are now and where we'll be in five years

Posted by   Martijn Grooten on   Nov 23, 2017

We look back at the VB2016 presentation by Adrian Sanabria on the state of endpoint security, both now and in the future.

Read more  

VB2017 paper: Beyond lexical and PDNS: using signals on graphs to uncover online threats at scale

Posted by   Martijn Grooten on   Nov 22, 2017

At VB2017 in Madrid, Cisco Umbrella (OpenDNS) researchers Dhia Mahjoub and David Rodriguez presented a new approach to detecting infected machines using graphs to detect botnet traffic at scale. Today we publish both Dhia and David's paper and the recording of their presentation.

Read more  

Firefox 59 to make it a lot harder to use data URIs in phishing attacks

Posted by   Martijn Grooten on   Nov 21, 2017

Firefox developer Mozilla has announced that, as of version 59 of the browser, many kinds of data URIs, which provide a way to create "domainless web content", will not be rendered in the browser, thus making this trick - used in various phishing campaigns - a lot less attractive.

Read more  

Standalone product test: FireEye Endpoint

Posted by   Martijn Grooten on   Nov 16, 2017

Virus Bulletin ran a standalone test on FireEye's Endpoint Security solution.

Read more  

VB2017 video: Consequences of bad security in health care

Posted by   Martijn Grooten on   Nov 13, 2017

Jelena Milosevic, a nurse with a passion for IT security, is uniquely placed to witness poor security practices in the health care sector, and to fully understand the consequences. Today, we publish the recording of a presentation given by Jelena at VB2017 in Madrid, in which she shared her inside view of security in hospitals.

Read more  

Vulnerabilities play only a tiny role in the security risks that come with mobile phones

Posted by   Martijn Grooten on   Nov 9, 2017

Both bad news (all devices were pwnd) and good news (pwning is increasingly difficult) came from the most recent mobile Pwn2Own competition. But the practical security risks that come with using mobile phones have little to do with vulnerabilities.

Read more  

Search blog

Trojan using webmail to send spam

Captcha systems possibly cracked to automate account creation.
Captcha systems possibly cracked to automate account creation.BitDefender has reported a new trojan attempting to bypass security measures on leading webmail systems Hotmail and… https://www.virusbulletin.com/blog/2007/07/trojan-using-webmail-send-spam/

Battle over Blackberry spyware threat

Spy tool for popular device claims to be legitimate.
Spy tool for popular device claims to be legitimate. The expansion of the FlexiSpy mobile device snooping software, originally available only for the Symbian platform but with… https://www.virusbulletin.com/blog/2007/07/battle-over-blackberry-spyware-threat/

Fourth of July targeted by trojan spam

Celebration card emails carry links to malware.
Celebration card emails carry links to malware. A further wave of greetings-card spam has been widely seeded, in the wake of considerable Storm Worm activity in the last week, with… https://www.virusbulletin.com/blog/2007/07/fourth-july-targeted-trojan-spam/

NOD32 alerts on suspect adverts

False positive reveals sneaky techniques used in ads.
False positive reveals sneaky techniques used in ads.ESET's NOD32 product was updated several times in close succession over the weekend, as false positives were introduced… https://www.virusbulletin.com/blog/2007/07/nod32-alerts-suspect-adverts/

Fake updates and phony postcards carry malware

Microsoft patch and greetings card spams bring more trojans.
Microsoft patch and greetings card spams bring more trojans. Several spam runs posing as vulnerability alerts from Microsoft have been spotted in the last week, with links to… https://www.virusbulletin.com/blog/2007/07/fake-updates-and-phony-postcards-carry-malware/

Challenge Blue Pill

Researcher challenged to prove 100% undetectable rootkit claim.
Researcher challenged to prove 100% undetectable rootkit claim. Joanna Rutkowska, the security researcher who last year claimed that she can create 100% undetectable malware, has… https://www.virusbulletin.com/blog/2007/07/challenge-blue-pill/

Pity poor MS Security workers

MS Security rated 6th worst job in science.
MS Security rated 6th worst job in science. Spare a thought this month for the staff of the Microsoft Security Response Center who, according to Popular Science magazine, have the… https://www.virusbulletin.com/blog/2007/07/pity-poor-ms-security-workers/

July

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/07/

Advance diary dates: VB2008

VB announces VB2008.
VB announces VB2008. VB is pleased to announce that VB2008 will take place 1-3 October 2008 in Ottawa, Canada. Reserve the dates and start making your travel plans now! If you… https://www.virusbulletin.com/blog/2007/07/advance-diary-dates/

July issue of VB published

The July issue of Virus Bulletin is now available for subscribers to download.
The July issue of Virus Bulletin is now available for subscribers to download. The July 2007 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2007/07/july-issue-vb-published/

Spammer offers new service

Spammer turns court order into money-making opportunity.
Spammer turns court order into money-making opportunity. Wily email marketer/spammer (depending on your viewpoint) David Linhardt, famed for suing UK spam-fighting organization… https://www.virusbulletin.com/blog/2007/07/spammer-offers-new-service/

Spanish mobile malware suspect arrested

28-year-old charged with Cabir/Commwarrior crimes.
28-year-old charged with Cabir/Commwarrior crimes. An unnamed man has been arrested in Valencia, Spain, on suspicion of creating and spreading 20 variants of the Cabir and… https://www.virusbulletin.com/blog/2007/06/spanish-mobile-malware-suspect-arrested/

Symantec presenter spotted using KAV

Another update embarrassment as rival software pops up.
Another update embarrassment as rival software pops up. After the recent damaging false positive incident in China, which has led Symantec to offer free software to those hit by… https://www.virusbulletin.com/blog/2007/06/symantec-presenter-spotted-using-kav/

US porn spammers convicted

Two found guilty of CAN-SPAM breaches.
Two found guilty of CAN-SPAM breaches. A federal jury in Phoenix, Arizona, has found two men guilty of two charges of violating the US CAN-SPAM regulations, as well as other… https://www.virusbulletin.com/blog/2007/06/us-porn-spammers-convicted/

100,000 new phishing sites set up in 7 days

IBM sees huge rise in kit-build scam sites.
IBM sees huge rise in kit-build scam sites. Phishing watchers at IBM's X-Force research team have recorded an enormous burst of phishing activity in the last seven days, with over… https://www.virusbulletin.com/blog/2007/06/100-000-new-phishing-sites-set-7-days/

UK users ignoring security issues

Surveys find public in the dark and careless about sensitive data.
Surveys find public in the dark and careless about sensitive data. Several surveys out this week have shown the UK public is failing to take basic security precautions to protect… https://www.virusbulletin.com/blog/2007/06/uk-users-ignoring-security-issues/

Latest VB100 announced

Products for 64-bit Windows Vista to be tested.
Products for 64-bit Windows Vista to be tested. VB has issued a call for submissions for the latest VB100 comparative review, with products for the 64-bit version of Microsoft… https://www.virusbulletin.com/blog/2007/06/latest-announced/

Mpack packs punch in Italy

10,000 sites carrying exploits in large-scale attack.
10,000 sites carrying exploits in large-scale attack. Sophisticated remote-exploit attack kit 'Mpack' has been spotted in use in increasingly large numbers throughout Europe, with… https://www.virusbulletin.com/blog/2007/06/mpack-packs-punch-italy/

China steps up fight against spammers

Blacklist aims to reduce massive spamming levels.
Blacklist aims to reduce massive spamming levels. Chinese web organisation the Internet Society of China (ISC) has announced the setting up of a central anti-spam blacklist, to… https://www.virusbulletin.com/blog/2007/06/china-steps-fight-against-spammers/

FBI serves up Operation Bot Roast

Investigations identify more than 1 million victim IP addresses.
Investigations identify more than 1 million victim IP addresses. The FBI has announced the results of an ongoing initiative, dubbed 'Operation Bot Roast', which is aimed at… https://www.virusbulletin.com/blog/2007/06/fbi-serves-operation-bot-roast/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.