Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Run your malicious VBA macros anywhere!

Kurt Natvig (Independent Researcher)

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…

Read more  

Dissecting the design and vulnerabilities in AZORult C&C panels

Aditya K Sood (Research Team at Office of The CTO, F5)

Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified during the research.

Read more  

Excel Formula/Macro in .xlsb?

Kurt Natvig (Forcepoint)

Excel Formula, or XLM – does it ever stop giving pain to researchers? Kurt Natvig takes us through his analysis of a new sample using the xlsb file format.

Read more  

Decompiling Excel Formula (XF) 4.0 malware

Kurt Natvig (Forcepoint)

Office malware has been around for a long time, but until recently Excel Formula (XF) 4.0 was not something researcher Kurt Natvig was very familiar with. In this article Kurt allows us to learn with him as he takes a deeper look at XF 4.0.

Read more  

APT vs Internet service providers – a threat hunter's perspective

Emanuele De Lucia (Telsy)

Organizations in the telecommunications sector are faced with a multitude of threats, ranging from targeted attacks to malicious actions attributable to the criminal or activist world. Telsy researcher Emanuele De Lucia reports what he observed in…

Read more  

VB2019 paper: APT cases exploiting vulnerabilities in region‑specific software

Shusei Tomonaga (JPCERT/CC)
Tomoaki Tani (JPCERT/CC)
Hiroshi Soeda (JPCERT/CC)
Wataru Takahashi (JPCERT/CC)

Some APT attacks are carried out by exploiting vulnerabilities in region-specific software. Government agencies frequently use such localized software, and this tends to be the target of attackers. In Japan, there have been many cases where attacks…

Read more  

Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

Abhishek Singh (Prismo Systems)
Ramesh Mani (Prismo Systems)

Web application vulnerabilities are an important entry vector for threat actors. In this paper researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting…

Read more  

VB2019 paper: Cyber espionage in the Middle East: Unravelling OSX.WindTail

Patrick Wardle (Jamf)

It’s no secret that many nation states possess offensive macOS cyber capabilities, though such capabilities are rarely publicly uncovered. However, when such tools are detected, they provide unparalleled insight into the operations and techniques…

Read more  

VB2019 paper: 2,000 reactions to a malware attack – accidental study

Adam Haertlé (BadCyber.com)

This paper presents an analysis of 1,976 unsolicited answers received from the targets of a malicious email campaign, who were mostly unaware that they were not contacting the real sender of the malicious messages. Many of the victims were unaware…

Read more  

VB2019 paper: Why companies need to focus on a problem they don't know they have

Richard Matti (NetClean Technologies)
Anna Creutz (NetClean Technologies)

There is a type of crime, breach of company policy, misuse of company assets and security threat that is often overlooked: as one in 500 employees use their work computer to handle child sexual abuse material. This crime and misuse of company assets…

Read more  
Previous1234567...113Next

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.