Tag: vb2016
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users
Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…
-
VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users
Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…
-
VB2016 paper: Modern attacks on Russian financial institutions
Today, we publish the VB2016 paper “Modern attacks on Russian financial institutions” ( here in HTML format and here in PDF format) by ESET researchers Jean-Ian Boutin and Anton Cherepanov. In it, they look at a number of groups that have performed sophisticated attacks against a number of Russian financial institutions. The work of these…
-
VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…
-
VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…