Tag: exploit kit

  • Paper: The journey and evolution of God Mode in 2016: CVE-2016-0189

    While avoiding the use of Flash is good advice for helping to fend off exploit kits, some of the vulnerabilities exploited by these kits actually target the browsers themselves. An important example of this is CVE-2016-0189, which affects Microsoft ‘s Internet Explorer browser versions 9 through 11. First discovered in the wild in targeted attacks…

  • Conference review: Botconf 2016

    This review was written by Martijn Grooten, Adrian Luca and Ionuț Răileanu. Though still only in its fourth year, Botconf has become one of the Virus Bulletin team’s favourite conferences. Late in November, three of the VB team flew to Lyon to attend this year’s three-day event. As its name suggests, Botconf is aimed at…

  • Conference review: Botconf 2016

    This review was written by Martijn Grooten, Adrian Luca and Ionuț Răileanu. Though still only in its fourth year, Botconf has become one of the Virus Bulletin team’s favourite conferences. Late in November, three of the VB team flew to Lyon to attend this year’s three-day event. As its name suggests, Botconf is aimed at…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • Research shows web security products perform well against exploit kits

    Among the security community a lot of research effort is dedicated to analysing exploit kits and their constantly evolving methods of frustrating researchers while infecting ordinary users with malware. A lot of this research is then used to design and build products that aim to prevent exploit kits from infecting users. But how well do…

  • Research shows web security products perform well against exploit kits

    Among the security community a lot of research effort is dedicated to analysing exploit kits and their constantly evolving methods of frustrating researchers while infecting ordinary users with malware. A lot of this research is then used to design and build products that aim to prevent exploit kits from infecting users. But how well do…

  • Romanian university website compromised to serve Neutrino exploit kit

    This blog post was written by Martijn Grooten and Adrian Luca. Like every summer, millions of prospective students around the world have been taking entry exams for the university courses they want to attend. Imagine how horrible it would be if those students, after visiting the website of their university of choice, suddenly found all…

  • Romanian university website compromised to serve Neutrino exploit kit

    This blog post was written by Martijn Grooten and Adrian Luca. Like every summer, millions of prospective students around the world have been taking entry exams for the university courses they want to attend. Imagine how horrible it would be if those students, after visiting the website of their university of choice, suddenly found all…

  • Paper: New Keylogger on the Block

    Keyloggers have long been a popular tool for cybercriminals, something made worse by the fact that many of them are sold commercially. Today, we publish a paper ( here as a PDF) by Sophos researcher Gabor Szappanos, in which he studies the ‘KeyBase’ keylogger. Though the product has officially been discontinued, allegedly because of abuse…