Tag: conference

  • VB2016 paper: Open Source Malware Lab

    Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…

  • A Christmas present for the security community

    A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…

  • A Christmas present for the security community

    A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…

  • VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users

    Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…

  • Conference review: Botconf 2016

    This review was written by Martijn Grooten, Adrian Luca and Ionuț Răileanu. Though still only in its fourth year, Botconf has become one of the Virus Bulletin team’s favourite conferences. Late in November, three of the VB team flew to Lyon to attend this year’s three-day event. As its name suggests, Botconf is aimed at…

  • VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users

    Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…

  • Conference review: Botconf 2016

    This review was written by Martijn Grooten, Adrian Luca and Ionuț Răileanu. Though still only in its fourth year, Botconf has become one of the Virus Bulletin team’s favourite conferences. Late in November, three of the VB team flew to Lyon to attend this year’s three-day event. As its name suggests, Botconf is aimed at…

  • VB2016 paper: Modern attacks on Russian financial institutions

    Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…

  • VB2016 paper: Modern attacks on Russian financial institutions

    Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…

  • VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment

    In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…