Notice

Virus Bulletin's blog

The latest Blog posts from the VB team
  1. New paper: Powering the distribution of Tesla stealer with PowerShell and VBA macros
    Since their return four years ago, Office macros have been one of the most common ways to spread malware. Today, we publish a research paper which looks in detail at a campaign in which VBA macros are used to execute PowerShell code, which in turn downloads the Tesla information-stealing trojan.

    Read more
  2. VB2017 paper: Android reverse engineering tools: not the usual suspects
    Within a few years, Android malware has grown from a relatively small threat to a huge problem involving more than three million new malware samples a year. Axelle Apvrille, one of the world's leading Android malware researchers, will deliver a workshop on Android reverse engineering at VB2018 in Montreal this October. Last year, Axelle presented a paper at VB2017 on some of the less common tools that can be used to reverse engineer Android malware. Today, we publish both the paper and the recording of Axelle's presentation.

    Read more
  3. Patch early, patch often, but don't blindly trust every 'patch'
    Compromised websites are being used to serve fake Flash Player uploads that come with a malicious payload.

    Read more
  4. Virus Bulletin at RSA
    Next week, VB Editor Martijn Grooten will be at the RSA Conference in San Francisco.

    Read more
  5. Broad-ranging and international VB2018 programme announced
    VB is excited to reveal the details of an interesting and diverse programme for VB2018, the 28th Virus Bulletin International Conference, which takes place 3-5 October in Montreal, Canada.

    Read more
  6. Netflix issue shows email verification really does matter
    A clever trick taking advantage of the fact that Gmail ignores dots in email addresses could be used to trick someone into paying for your Netflix subscription - demonstrating the importance of confirmed opt-in.

    Read more
  7. VB2017 paper: Exploring the virtual worlds of advergaming
    At VB2017 in Madrid, Malwarebytes' Chris Boyd presented a paper in which he looked at various aspects of advergaming, from unreadable EULAs to fake programs that promise to block ads. Today, we publish both the paper and the recording of Chris's presentation.

    Read more
  8. New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach
    Two or more mobile apps, viewed independently, may not appear to be malicious - but in combination, they could become harmful by exchanging information with one another and by performing malicious activities together. Today, we publish a new paper by a group of researchers affiliated with various UK universities and companies, which looks at how machine-learning methods can be used to detect app collusions.

    Read more
  9. VB2016 paper: Wild Android collusions
    At VB2016 in Denver, Jorge Blasco presented a paper (co-written with Thomas M. Chen, Igor Muttik and Markus Roggenbach), in which he discussed the concept of app collusion - where two (or more) apps installed on the same device work together to collect and extract data from the device - and presented discoveries of colluding code in many in-the-wild apps. Today, we publish both the paper and the recording of Jorge's presentation.

    Read more
  10. VB2017 paper: The life story of an IPT - Inept Persistent Threat actor
    At VB2017 in Madrid, Polish security researcher and journalist Adam Haertlé presented a paper about a very inept persistent threat. Today, we publish both the paper and the recording of Adam's presentation.

    Read more