Tag: eset

  • VB2020 presentation: Ramsay: a cyber-espionage toolkit tailored for air-gapped networks

    Air gapping is a network security measure commonly used in military/governmental, financial and industrial control systems networks that is applied to one or more computers in order to ensure that a given network is physically isolated – usually in order to prevent exposure of the subject network to the Internet or the local area network. In…

  • VB2019 presentation: Attor: spy platform with curious GSM fingerprinting

    Attor is a newly discovered cyber-espionage platform, use of which dates back to at least 2014 and which focuses on diplomatic missions and governmental institutions. The modular malware searches specifically for TrueCrypt ‑protected hard drives and the processes of specific VPN applications, suggesting a special interest in security-focused users. The most notable plug-in is one…

  • VB2019 paper: Rich headers: leveraging the mysterious artifact of the PE format

    When analysing malware, especially if it’s new and rare, researchers look for every possible clue that could give them details on the context and perhaps help them find similar samples. One such clue could be what has been called ‘rich headers’, an undocumented chunk of data inside PE files. In a paper presented at VB2019…

  • VB2019 videos: partner presentations

    With the final day of VB2019 three weeks behind us, we want to thank once again the 21 partners and sponsors of the conference for their support. In supporting the conference, the companies and organisations demonstrated how much they care about the sharing of research on current threats. We especially want to thank Platinum partners…

  • VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

    The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups of recent years. It has engaged in digital espionage, destructive attacks and financially motivated attacks, and was probably the most discussed threat group at VB2018 in Montreal. One of the Lazarus-related papers at VB2018 was written by…

  • VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

    The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups of recent years. It has engaged in digital espionage, destructive attacks and financially motivated attacks, and was probably the most discussed threat group at VB2018 in Montreal. One of the Lazarus-related papers at VB2018 was written by…

  • First 11 partners of VB2019 announced

    The Virus Bulletin Conference is all about bringing the security community together to share intelligence and move the industry forward, but we wouldn’t be able to do any of this without the support of our partners. Today, we are pleased to announce the first 11 partners of VB2019. Partnering the conference at Platinum level we…

  • First 11 partners of VB2019 announced

    The Virus Bulletin Conference is all about bringing the security community together to share intelligence and move the industry forward, but we wouldn’t be able to do any of this without the support of our partners. Today, we are pleased to announce the first 11 partners of VB2019. Partnering the conference at Platinum level we…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…