Tag: cybercrime
-
VB2017 paper: The life story of an IPT – Inept Persistent Threat actor
Last Wednesday, Belgium-based Polish hacker Thomasz T. was arrested during a visit to his home country. Thomasz is believed to be the author of the Polski, Vortex, and Flotera ransomware families. Though this may look impressive on one’s cybercrime CV, it turns out that Thomasz may not be the most skilled of hackers. At VB2017…
-
VB2017 paper: The life story of an IPT – Inept Persistent Threat actor
Last Wednesday, Belgium-based Polish hacker Thomasz T. was arrested during a visit to his home country. Thomasz is believed to be the author of the Polski, Vortex, and Flotera ransomware families. Though this may look impressive on one’s cybercrime CV, it turns out that Thomasz may not be the most skilled of hackers. At VB2017…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
Despite the profitability of ransomware there is a good reason why mining malware is thriving
When, a few years ago, a friend and I were analysing a rather large botnet and we saw some network traffic indicating that it was engaged in Bitcoin mining, we felt rather disappointed: using malware to mine for cryptocurrencies is about as basic as it gets. It is the digital equivalent of breaking into someone’s house,…
-
Despite the profitability of ransomware there is a good reason why mining malware is thriving
When, a few years ago, a friend and I were analysing a rather large botnet and we saw some network traffic indicating that it was engaged in Bitcoin mining, we felt rather disappointed: using malware to mine for cryptocurrencies is about as basic as it gets. It is the digital equivalent of breaking into someone’s house,…
-
Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 1
With an excellent conference programme (and still some gaps to fill !), we have much to look forward to when it comes to VB2017, the 27th Virus Bulletin conference . But we also often look back at past conference presentations, not just because we are proud to have had them presented at our conference, but…
-
Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 1
With an excellent conference programme (and still some gaps to fill !), we have much to look forward to when it comes to VB2017, the 27th Virus Bulletin conference . But we also often look back at past conference presentations, not just because we are proud to have had them presented at our conference, but…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…