Tag: vb2018
-
VB2018 video: Triada: the past, the present and the (hopefully not existing) future
From NotPetya to Shadowpad, supply chain attacks have become a serious and hard-to-fight security problem. One prominent type of supply chain attack involves the pre-installation of malware on (often) cheap Android devices. At VB2018 in Montreal, Google researcher Łukasz Siewierski talked about one such case: that of the multi-purpose ‘Triada’ trojan. First discovered by Kaspersky…
-
VB2018 video: Triada: the past, the present and the (hopefully not existing) future
From NotPetya to Shadowpad, supply chain attacks have become a serious and hard-to-fight security problem. One prominent type of supply chain attack involves the pre-installation of malware on (often) cheap Android devices. At VB2018 in Montreal, Google researcher Łukasz Siewierski talked about one such case: that of the multi-purpose ‘Triada’ trojan. First discovered by Kaspersky…
-
VB2018 paper: Now you see it, now you don’t: wipers in the wild
Early computer viruses were often destructive in nature, but once criminals learned about the money they could make from malware, they realised that destructiveness hurt their goals. Destructive malware, however, has made a comeback in recent years, most importantly in nation-sponsored attacks. Some of these malware variants literally wipe all data off disks (hence the…
-
VB2018 paper: Now you see it, now you don’t: wipers in the wild
Early computer viruses were often destructive in nature, but once criminals learned about the money they could make from malware, they realised that destructiveness hurt their goals. Destructive malware, however, has made a comeback in recent years, most importantly in nation-sponsored attacks. Some of these malware variants literally wipe all data off disks (hence the…
-
VB2018 paper: Who wasn’t responsible for Olympic Destroyer?
It may be hard to believe, but it was only eight months ago that the 2018 PyeongChang Winter Olympic Games were targeted by malware named Olympic Destroyer. Though not the first time the Olympic Games had been the target of malware, Olympic Destroyer, as its name suggests, did appear to be destructive in nature. Cisco…
-
VB2018 paper: Who wasn’t responsible for Olympic Destroyer?
It may be hard to believe, but it was only eight months ago that the 2018 PyeongChang Winter Olympic Games were targeted by malware named Olympic Destroyer. Though not the first time the Olympic Games had been the target of malware, Olympic Destroyer, as its name suggests, did appear to be destructive in nature. Cisco…
-
VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm
When it comes to web-based threats, Malwarebytes researcher Jérôme Segura is one of the people to follow. His quarterly reviews of the exploit kit landscape are an essential read for anyone who follows this type of threat. In his latest review , Jérôme writes about a slight reversal of an important shift seen in the past…
-
VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm
When it comes to web-based threats, Malwarebytes researcher Jérôme Segura is one of the people to follow. His quarterly reviews of the exploit kit landscape are an essential read for anyone who follows this type of threat. In his latest review , Jérôme writes about a slight reversal of an important shift seen in the past…