Tag: turla

  • VB2018 video: Shedding skin – Turla’s fresh faces

    “Capable, well-resourced, and they go back decades.” The Turla threat group doesn’t make the news as much as some other Russian-speaking APT groups, but it is one of the most advanced and most diverse groups out there. At VB2018 in Montreal, Kurt Baumgartner and Mike Scott from Kaspersky Lab ‘s GReAT detailed the latest malware…

  • VB2018 video: Shedding skin – Turla’s fresh faces

    “Capable, well-resourced, and they go back decades.” The Turla threat group doesn’t make the news as much as some other Russian-speaking APT groups, but it is one of the most advanced and most diverse groups out there. At VB2018 in Montreal, Kurt Baumgartner and Mike Scott from Kaspersky Lab ‘s GReAT detailed the latest malware…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2015 video: TurlaSat: The Fault in our Stars

    Kurt Baumgartner talks about Turla’s extraplanetary activities. Despite the hype around the subject, the tools used by most so-called APT groups are surprisingly mundane. But there are exceptions. In September 2015, researchers at Kaspersky Lab published research on the Turla APT group (also known as Uroburos or Snake), which hijacked satellite Internet links for command…

  • VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

    Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘ Unveiling the kernel: rootkit discovery using selective…