Tag: cybercrime

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • VB2015 paper: Sizing cybercrime: incidents and accidents, hints and allegations

    How big is cybercrime? Various attempts have been made to measure the size of cybercrime around the world, or in individual countries, but how reliable are the methodologies used, and what do they actually measure? In the paper ” Sizing cybercrime: incidents and accidents, hints and allegations ” presented at VB2015 in Prague, ESET researcher…

  • Paper: 3ROS exploit framework kit — one more for the infection road

    Aditya K. Sood and Rohit Bansal highlight a different side of an exploit kit. Exploit kits are a serious plague on the Internet, made worse by the fact that the online advertisement ecosystem allows cybercriminals to run their malicious code on many websites. The kits are studied extensively by security researchers, who attempt to follow…

  • Throwback Thursday: Misguided or malevolent? New trends in virus writing

    This Throwback Thursday, we turn the clock back to February 2004 when Stuart Taylor wondered whether there was truly a criminal element entering virus writing. These days, no one would argue that there wasn’t a criminal element in virus writing — cybercrime is big business and has evolved into a truly organized crime ecosystem. On…

  • Paper: Beta exploit pack: one more piece of crimeware for the infection road!

    Exploit kit currently being tested focuses primarily on Flash Player exploits. Nuclear, Angler, Magnitude and Rig. Security researchers know we’re talking about exploit kits (or browser exploit packs), toolkits that automate the exploitation of client-side vulnerabilities and thus facilitate infection through drive-by downloads. Today, we publish an article by researchers Aditya K. Sood and Rohit…

  • VB2014 paper: Hiding the network behind the network. Botnet proxy business model

    Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Hiding the network behind the network. Botnet proxy business model’ by Bitdefender researchers Alexandru Maximciuc, Razvan Benchea and…

  • VB2014 paper: Exposing Android white collar criminals

    Luis Corrons dives into the world of shady Android apps. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Exposing Android white collar criminals’ by Panda Security researcher Luis Corrons. Android is by far the most popular operating system when…

  • VB2014 paper: DNSSEC – how far have we come?

    Nick Sullivan describes how DNSSEC uses cryptography to add authentication and integrity to DNS responses. Over the next months, we will be sharing conference papers as well as video recordings of the presentations. Today, we have added ‘DNSSEC – how far have we come?’ by CloudFlare’s Nick Sullivan. It is rather scary to think about…

  • VB2014 paper: The evolution of webinjects

    Jean-Ian Boutin looks at the increased commoditization of webinjects. Virus Bulletin has always been about sharing information, and the Virus Bulletin conference is an important part of that. We would love to be able to share some of the discussions attendees had during the lunch and coffee breaks, the late-night or early-morning meetings in the…