Virus Bulletin - May 2013

Editor: Helen Martin

Technical Consultant: John Hawes

Technical Editor: Morton Swimmer

Consulting Editors: Ian Whalley, Nick FitzGerald, Richard Ford, Edward Wilding



Botnets of the mind

‘Hoaxers ... use a form of memetic malware (‘viruses of the mind’) in order to reprogram system users.' David Harley, ESET.

David Harley - ESET, UK


Security firms form new EU CERT

European security firms join forces to form the largest CERT provision in Europe.

Helen Martin - Virus Bulletin, UK

ACLU files complaint against mobile carriers

Complaint lodged against mobile phone carriers for failing to warn users about Android security flaws.

Helen Martin - Virus Bulletin, UK

Malware prevalence report

March 2013

The Virus Bulletin prevalence table is compiled monthly from virus reports received by Virus Bulletin; both directly, and from other companies who pass on their statistics.

Malware analyses

Read the Transcript

Metamorphism seems to be the holy grail for virus writers in general. The assumption is that it is more difficult for an anti-virus engine to detect a metamorphic virus than it is to detect a ‘lesser’ virus. As a result, there have been attempts to implement metamorphism on multiple platforms, the latest of which is JavaScript. Peter Ferrie has the details of JS/Transcript.

Peter Ferrie - Microsoft, USA

A good look at the Andromeda botnet

The Andromeda bot is flexible and dynamic. Its modular structure allows it to enhance its abilities in different fields simply by installing different modules. He Xu takes a close look at the Andromeda botnet.

He Xu - Fortinet, Canada

Persistency in the wild

Strong encryption and sophisticated algorithms are not necessarily what make a piece of malware persistent. Rather, it is the use of a cocktail of techniques that ensures the longevity of malware in the wild. Raul Alvarez looks at some of the techniques used by W32/Kolab.

Raul Alvarez - Fortinet, Canada

Technical Feature

Cat-and-mouse game in CVE 2012-0158

Ruhai Zhang takes a look at the cat-and-mouse game of exploit samples, focusing on the widely used CVE-2012-0158 vulnerability.

Ruhai Zhang - Fortinet, China

Comparative review

VBSpam comparative review May 2013

This month's VBSpam test showed an upturn in average spam catch rates after the decline seen earlier in the year - with 19 out of 20 full solutions earning VBSpam certification. The test also highlighted the fact that spam sent from web hosts poses a bigger challenge for most filters than spam sent from other sources. Martijn Grooten has the details.

Martijn Grooten - Virus Bulletin, UK


Anti-malware industry events

Must-attend events in the anti-malware industry - dates, locations and further details.


Latest articles:

The TAO of Automated Iframe Injectors – Building Drive‑by Platforms For Fun and Profit

Aditya Sood and Rohit Bansal present the design of distributed infection models used by attackers to inject malicious iframes on the fly in order to conduct large-scale drive-by download attacks.

Throwback Thursday: Following the Breadcrumbs

Christine Orshesky describes how one large organization (with over 40,000 systems in its decentralized computing environment and a diverse population of over 20,000 employees spread over various departments and networks) decided to find out how and…

Behavioural Detection and Prevention of Malware on OS X

Malware on Apple’s OS X systems is proving to be an increasing security threat, and one that is currently countered solely with traditional anti-virus (AV) technologies. Traditional AV technologies impose a significant performance overhead on the…

Throwback Thursday: Olympic Games

In 1994, along with the Olympic Games came an Olympic virus, from a group of Swedish virus authors calling themselves ‘Immortal Riot’. Mikko Hyppönen had the details.

Throwback Thursday: Holding the Bady

In 2001, ‘Code Red’ caused White House administrators to change the IP address of the official White House website, and even penetrated the mighty Microsoft’s own IIS servers. In August 2001, Costin Raiu analysed the Win32/Bady.worm,