Tag: encryption

  • VB2018 video: Behind the scenes of the SamSam investigation

    Yesterday, a federal grand jury in the US unsealed an indictment charging two Iranians with being behind the SamSam ransomware. SamSam has been one of the most successful ransomware campaigns in recent years, thanks to the clever targeting of specific organisations, including universities, hospitals and local governments. This targeting allowed the attackers to ensure the…

  • VB2018 video: Behind the scenes of the SamSam investigation

    Yesterday, a federal grand jury in the US unsealed an indictment charging two Iranians with being behind the SamSam ransomware. SamSam has been one of the most successful ransomware campaigns in recent years, thanks to the clever targeting of specific organisations, including universities, hospitals and local governments. This targeting allowed the attackers to ensure the…

  • VB2017 paper: Nine circles of Cerber

    Earlier this week, we published the video of a VB2017 presentation on the Spora ransomware. Spora is hardly alone in this prominent threat type though, and one of the other major names in the world of ransomware is Cerber, which operates a successful affiliate scheme, making it ‘The McDonald’s of the underworld’. Last year, Check…

  • VB2017 paper: Nine circles of Cerber

    Earlier this week, we published the video of a VB2017 presentation on the Spora ransomware. Spora is hardly alone in this prominent threat type though, and one of the other major names in the world of ransomware is Cerber, which operates a successful affiliate scheme, making it ‘The McDonald’s of the underworld’. Last year, Check…

  • VB2017 preview: Crypton – exposing malware’s deepest secrets

    Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…

  • VB2017 preview: Crypton – exposing malware’s deepest secrets

    Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…

  • VB2017 Small Talk: The encryption vs. inspection debate

    We all know that security often gets in the way of convenience, but sometimes security even gets in the way of security. This is the case, for example, when a decision needs to be made on whether to break an encrypted HTTP connection in order to inspect it for malicious content. HTTPS allows for this to…

  • VB2017 Small Talk: The encryption vs. inspection debate

    We all know that security often gets in the way of convenience, but sometimes security even gets in the way of security. This is the case, for example, when a decision needs to be made on whether to break an encrypted HTTP connection in order to inspect it for malicious content. HTTPS allows for this to…

  • NoMoreRansom’s first birthday demonstrates importance of collaboration

    This week, the NoMoreRansom project celebrates its first anniversary and can look back to subtle but important successes in the fight against ransomware. The advice from security experts to ransomware victims tends to be twofold: keep backups, and don’t pay the ransom . The former is indeed very important advice, but isn’t really helpful when…

  • NoMoreRansom’s first birthday demonstrates importance of collaboration

    This week, the NoMoreRansom project celebrates its first anniversary and can look back to subtle but important successes in the fight against ransomware. The advice from security experts to ransomware victims tends to be twofold: keep backups, and don’t pay the ransom . The former is indeed very important advice, but isn’t really helpful when…