Tag: targeted attack
-
Tizi Android malware highlights the importance of security patches for high-risk users
A well-known security researcher once said : “if you purposely choose Android you are either Poor, Cheap, or really hate Apple.” Android has a bad reputation in security circles, though these days that is less because of a lack of effort on Google ‘s part and more because of the prevalence of many older devices…
-
VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks
In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…
-
VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks
In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…
-
VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks
Security researchers have a complicated relationship with attribution. On the one hand, for technical analyses, it doesn’t matter whether an attack was performed by a Bear, a Panda or an Eagle, and whether it was Cozy or Fancy. But security research doesn’t exist in a void, and in an era where the overlap with geopolitics…
-
VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks
Security researchers have a complicated relationship with attribution. On the one hand, for technical analyses, it doesn’t matter whether an attack was performed by a Bear, a Panda or an Eagle, and whether it was Cozy or Fancy. But security research doesn’t exist in a void, and in an era where the overlap with geopolitics…
-
VB2015 preview: advanced persistent threats
Several conference papers to deal with targeted attacks. There was a time when analyses of malware and viruses at the Virus Bulletin conference used the number of infections as a measure of the harm done. And while there are still many talks on what is now referred to as ‘opportunistic malware’, targeted attacks, or APTs,…
-
Volatile Cedar campaign – cyber espionage isn’t just for large nation states
Details of malware to be discussed at VB2015. Researchers at Check Point have revealed details of a cyber-espionage campaign, dubbed ‘Volatile Cedar’, that has been active since at least 2012. The campaign, whose motive appears to be political rather than financial, revolves around a custom-made remote access trojan named ‘Explosive’, which is separated into a…
-
VB2014 paper: Apple without a shell – iOS under targeted attack
Developer Enterprise Program recently found to be used by WireLurker. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Apple without a shell – iOS under targeted attack’, by FireEye researchers Tao Wei, Min Zheng, Hui Xue and Dawn Song.…