Blog keyword search

VB2019 paper: Never before had Stierlitz been so close to failure (or: what is a Soviet super-spy doing in a popular bundleware for Mac?)

Today, we publish the VB2019 paper and video by Sophos researcher Sergei Shevchenko in which he analyses a popular yet unnamed piece of macOS ‘bundleware’.
Over the years, many ‘potentially unwanted applications’ have plagued macOS in the same way they have plagued other platforms. Though anti-virus isn’t ubiquitous on Macs,… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-never-had-stierlitz-been-so-close-failure-or-what-soviet-super-spy-doing-popular-bundleware-mac/

VB2019 paper: Exploring the Chinese DDoS landscape

China has long been a hotbed of DDoS activities, and today we publish a VB2019 paper by Intezer researcher Nacho Sanmillan who looked at Chinese threat groups engaged in performing DDoS attacks. We have also uploaded the recording of his presentation.
Exploring the Chinese DDoS landscape Read the paper (HTML) Download the paper (PDF)       China has long been a hotbed of DDoS activities, with several groups… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-exploring-chinese-ddos-landscape/

VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks

Today we publish the VB2019 paper by Anurag Shandilya (K7 Computing) who looked at recent malware attacks against routers, as well as the video of his presentation in London.
Given their prominent position on home and corporate networks and their often poor standard of security, one might be forgiven for being surprised that massive attacks against… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-absolutely-routed-why-routers-are-new-bullseye-cyber-attacks/

VB2020 call for papers - now open!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2020 is now open and we want to hear from you!
In the October 1990 edition of Virus Bulletin (pdf), then a printed monthly magazine sent to subscribers around the world by post, the very first Virus Bulletin conference was… https://www.virusbulletin.com/blog/2019/12/vb2020-call-papers-now-open/

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.
Operation Soft Cell - a worldwide campaign against telecommunication providers Read the paper (HTML) Download the paper (PDF)   In June this year, Cybereason published a blog… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-operation-soft-cell-worldwide-campaign-against-telecommunication-providers/

VB2019 paper: A study of Machete cyber espionage operations in Latin America

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the analysis of…
A study of Machete cyber espionage operations in Latin America Read the paper (HTML) Download the paper (PDF)       Latin America has long been a hotbed for… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-study-machete-cyber-espionage-operations-latin-america/

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to surveillan…
    Levels of anxiety over technology and interconnectedness are growing. People are becoming increasingly concerned about privacy, and wary that every gadget or app… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-push-fiction-increased-surveillance-and-its-impact-privacy/

VB2019 paper: Oops! It happened again!

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.
    Oops! It happened again! Read the paper (HTML) Download the paper (PDF)   Different forms of malware and cyber threats are constantly making the news headlines,… https://www.virusbulletin.com/blog/2019/12/vb2019-paper-oops-it-happened-again/

VB2019 video: Thwarting Emotet email conversation thread hijacking with clustering

At VB2019 in London, ZEROSPAM researchers Pierre-Luc Vaudry and Olivier Coutu discussed how email clustering could be used to detect malicious Emotet emails that hijacked existing email threads. Today we publish the recording of their presentation.
Having returned from its summer break, Emotet is once again being used as the first stage of many often prominent and costly malware infections. A detailed analysis of the malware… https://www.virusbulletin.com/blog/2019/11/vb2019-video-thwarting-emotet-email-conversation-thread-hijacking-clustering/

VB2019 paper: A vine climbing over the Great Firewall: a long-term attack against China

Today we publish a VB2019 paper from Lion Gu and Bowen Pan from the Qi An Xin Threat Intelligence Center in China in which they analysed an APT group dubbed 'Poison Vine', which targeted various government, military and research institutes in China.
A vine climbing over the Great Firewall: a long-term attack against China Read the paper (HTML) Download the paper (PDF)       The global nature of both the Virus… https://www.virusbulletin.com/blog/2019/11/vb2019-paper-vine-climbing-over-great-firewall-long-term-attack-against-china/

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution and t…
Different ways to cook a crab: GandCrab ransomware-as-a-service (RaaS) analysed in depth Read the paper (HTML) Download the paper (PDF)       Though active for not… https://www.virusbulletin.com/blog/2019/11/vb2019-paper-different-ways-cook-crab-gandcrab-ransomware-service-raas-analysed-depth/

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.
In June, employees at cryptocurrency exchange Coinbase were targeted by emails linking to a website that used two zero-day vulnerabilities in the Firefox browser to deliver macOS… https://www.virusbulletin.com/blog/2019/11/vb2019-video-discretion-apt-recent-apt-attack-crypto-exchange-employees/

Programme for VB2019 Threat Intelligence Practitioners' Summit announced

In the mini-summit, which forms part of VB2019 (the 29th Virus Bulletin International Conference), eight sessions will focus on all aspects of threat intelligence collecting, using and sharing.
In its almost 30-year history, the Virus Bulletin Conference has evolved to become perhaps the most international threat intelligence event of the year. This is yet again… https://www.virusbulletin.com/blog/2019/09/programme-vb2019-threat-intelligence-practitioners-summit-announced/

VB2019 preview: Small Talks

We preview the five Small Talks on the VB2019 programme in which important topics are discussed in a less formal atmosphere.
Those who attend security conferences know the importance of 'hallcon': the conversations that take place in the corridors in between sessions or sometimes between people who have… https://www.virusbulletin.com/blog/2019/09/vb2019-preview-small-talks/

VB2019 preview: Problem child: common patterns in malicious parent-child relationships

We preview the VB2019 paper by Endgame researcher Bobby Filar, who created a graph-based framework designed to detect malicious use of legitimate binaries through parent-child relationships.
Living-off-the-land binaries, often referred to as LOLbins, are legitimate (Windows) binaries used for malicious purposes. Their use has increased in malware campaigns in recent… https://www.virusbulletin.com/blog/2019/09/vb2019-preview-problem-child-common-patterns-malicious-parent-child-relationships/

VB2019 preview: Inside Magecart: the history behind the covert card-skimming assault on the e-commerce industry

We preview the VB2019 paper by RiskIQ researcher Yonathan Klijnsma on the Magecart web skimming attacks.
Half a decade ago, breaches of point-of-sale (POS) systems were a real plague, especially in North America, with the 2013 Target breach perhaps the best known example. Though… https://www.virusbulletin.com/blog/2019/08/vb2019-preview-inside-magecart-history-behind-covert-card-skimming-assault-e-commerce-industry/

VB2019 call for last-minute papers closes on Sunday (1 Sept)

Your last chance to get a speaking slot on the VB2019 programme with a talk on hot research!
The majority of the VB2019 programme was announced in April, and though we like to see VB as a conference that looks beyond the hype, we are more than a little proud that several… https://www.virusbulletin.com/blog/2019/08/vb2019-call-last-minute-papers-closes-sunday-1st-sept/

21 organisations partner with VB2019

Record number of partner organisations for the Virus Bulletin Conference reflects very broad and international event.
Three months after we announced the first 14 partners and supporting organisations for VB2019, the 29th Virus Bulletin Conference, seven more organisations have signed up to… https://www.virusbulletin.com/blog/2019/08/21-organisations-partner-vb2019/

VB2019 preview: Exploring Emotet, an elaborate everyday enigma

We preview the VB2019 paper by Sophos researcher Luca Nagy, who dives deeply into the notorious Emotet malware.
Active since 2014, initially as a banking trojan, Emotet has been a plague on the Internet in recent years. Emotet's core strength is its ability to download other malware, thus… https://www.virusbulletin.com/blog/2019/08/vb2019-preview-exploring-emotet-elaborate-everyday-enigma/

AfricaHackon 2019: a great event and a reminder that security is global

Last week, VB Editor Martijn Grooten travelled to the Kenyan capital Nairobi to speak at the 6th edition of the AfricaHackon event.
It was a few years ago that I first learned of AfricaHackon, Africa's premier IT security conference. It led me to invite Tyrus Kamau, one of the event's organisers, to speak at… https://www.virusbulletin.com/blog/2019/08/africahackon-2019-reminder-security-global/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.