Category: blog

  • Ebury and Mayhem server malware families still active

    Whether it is to send spam or to redirect web traffic to malicious payloads, compromised ( Linux ) web servers are the glue in many a malware campaign. Two such networks of compromised servers – about which VB has published papers in the past – have recently received updates. The paper ‘Operation Windigo’ ( pdf ) was…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • VB2017 paper: Crypton – exposing malware’s deepest secrets

    Computer scientists are notorious for a specific kind of laziness: the kind of laziness that makes them work really hard in order to avoid some other, often more boring, hard work. Crypton , a tool developed by F5 Networks researchers Julia Karpin and Anna Dorfman, is a great example of that: it aims to speed…

  • VB2017 paper: The sprawling market of consumer spyware

    Nation states, criminals and bored teenagers are the various kinds of adversaries the security community is used to facing, and they are all well understood. There is one type of adversary, however, that is less well understood: that of an abusive partner or ex-partner. Yet, for many people, this is a very real threat: the…

  • VB2017 paper: The sprawling market of consumer spyware

    Nation states, criminals and bored teenagers are the various kinds of adversaries the security community is used to facing, and they are all well understood. There is one type of adversary, however, that is less well understood: that of an abusive partner or ex-partner. Yet, for many people, this is a very real threat: the…

  • Gábor Szappanos wins fourth Péter Szőr Award

    Every year, during the Virus Bulletin Conference gala dinner, we celebrate the life and works of Péter Szőr, the brilliant security researcher who passed away so sadly in 2013. We do so by recognizing a great piece of technical security research with the Péter Szőr Award. This year, we received many nominations, which we narrowed down…

  • Gábor Szappanos wins fourth Péter Szőr Award

    Every year, during the Virus Bulletin Conference gala dinner, we celebrate the life and works of Péter Szőr, the brilliant security researcher who passed away so sadly in 2013. We do so by recognizing a great piece of technical security research with the Péter Szőr Award. This year, we received many nominations, which we narrowed down…

  • VB2017 paper: Walking in your enemy’s shadow: when fourth-party collection becomes attribution hell

    Of all the possible targets for digital spies, there is one particularly attractive target that doesn’t get a lot of attention: that of other espionage campaigns. Yet this kind of fourth-party collection really does go on. Earlier this month, at VB2017 , Costin Raiu and Juan Andrés Guerrero-Saade, from Kaspersky Lab ‘s GReAT team, presented…

  • VB2017 paper: Walking in your enemy’s shadow: when fourth-party collection becomes attribution hell

    Of all the possible targets for digital spies, there is one particularly attractive target that doesn’t get a lot of attention: that of other espionage campaigns. Yet this kind of fourth-party collection really does go on. Earlier this month, at VB2017 , Costin Raiu and Juan Andrés Guerrero-Saade, from Kaspersky Lab ‘s GReAT team, presented…

  • Didn’t come to VB2017? Tell us why!

    Last week, hundreds of security researchers from around the world gathered in Madrid for VB2017 , the 27th Virus Bulletin International Conference. Every year, we ask those attending the conference to fill in a survey to help us understand what they liked and what they didn’t like about the event, and to hear their suggestions…