Virus Bulletin

@virusbtn

Security information portal, testing and certification body. Organisers of the annual Virus Bulletin conference.

Oxfordshire, UK
Joined February 2010
Born July 1, 1989

Tweets

You blocked @virusbtn

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @virusbtn

  1. Pinned Tweet
    Mar 7

    VB has launched the call for papers for VB2022, Prague. Submit your proposals for papers before 22 April for a chance to be part of one of the longest running security conferences in the world.

    Undo
  2. 2 hours ago

    Zscaler researchers have identified a novel Windows-based malware they call FFDroider. FFDroider is a stealer capable of stealing cookies and credentials from the victim’s machine.

    Undo
  3. 3 hours ago

    ESET's has analysed three malicious Android applications targeting the customers of eight Malaysian banks. The campaign tempts potential victims to download malicous apps from fake websites that pose as legitimate services in Facebook ads.

    Undo
  4. 4 hours ago

    On the SANS ISC blog, analyses the new MetaStealer malware from malicious Excel files distributed in malspam.

    Undo
  5. 6 hours ago

    Symantec researchers look into a Cicada (aka APT10) attack targeting organizations around the globe in what is likely an espionage campaign that has been ongoing for several months.

    Undo
  6. 6 hours ago

    There are just two weeks left to submit an abstract for VB2022; the call for papers closes on 22 April.

    Undo
  7. 7 hours ago

    Avast's & analyse a Traffic Direction System they call Parrot TDS. The TDS has infected various web servers hosting more than 16,500 websites and acts as a gateway for further malicious campaigns to reach potential victims.

    Undo
  8. Apr 7

    Fortinet researchers analyse how Remcos RAT is delivered and executed, what sensitive information it could steal, how it connects to its C2 server and what commands Remcos provides to the victim’s device.

    Undo
  9. Apr 7

    On the NVISO Labs blog, presents a beginner-friendly guide on how to analyse a multilayer malicious document. The blog also describes how to install the different tools used.

    Undo
  10. Apr 7

    Security researcher 's first blog post is an analysis of the WannaHusky ransomware emulator, complete with YARA rules and TTPs.

    Undo
  11. Apr 7

    Cybereason researchers have discovered a new possible APT-C-23 espionage campaign that targets Israeli individuals & officials.The attackers use fake Facebook profiles to trick individuals into downloading trojanized direct message apps for Android & PC.

    Undo
  12. Retweeted
    Apr 6
    Show this thread
    Undo
  13. Apr 6

    Tomorrow presents a webinar with Alex Dubrovsky, VP Software Engineering & Threat Research and CTA's Neil Jenkins, who discuss what threat researchers observed in 2021 and the latest trends in malware, exploit types & techniques

    Undo
  14. Apr 6

    The VB2022 call for papers is open (deadline 22 April). Whilst the main focus of the VB conference is threat research and analysis we also very much welcome talks on other subject that are relevant to the community!

    Undo
  15. Apr 6

    Armorblox has details of a malspam campaign that spoofs a voice message notification from WhatsApp. On clicking the link an attempt is made to install infostealer malware on the machine.

    Undo
  16. Apr 6

    Cisco Talos' & Alex Karkins write about ongoing malware distribution campaigns that use ISO disk images to deliver AsyncRAT, LimeRAT and other commodity malware to victims.These campaigns appear to be linked to a new version of the 3LOSH crypter.

    Undo
  17. Apr 6

    Malwarebytes' , & describe Colibri Loader's persistence technique. Colibri is still in its infancy but it already offers many features for attackers and seems slowly to be gaining popularity.

    Undo
  18. Retweeted
    Apr 5

    Want to hear more about the history of botnets from me and ? Listen to Season 9, Episode 4: Dawn of the Botnets from Red Hat's Command Line Heroes.

    Undo
  19. Retweeted

    1- I am happy to announce the publication of the investigation I conducted in regarding the hacking of the devices of journalists, human rights defenders and lawyers using the Israeli spyware report :

    Show this thread
    Undo
  20. Apr 5

    Fortinet researchers observed that the Beastmode (aka B3astmode) Mirai-based DDoS campaign has aggressively updated its arsenal of exploits. Five new exploits were added within a month, with three targeting various models of TOTOLINK routers.

    Undo
  21. Apr 5

    Intezer's & write about a recently developed malware framework called Elephant being delivered in targeted spear phishing campaigns using spoofed Ukrainian governmental email addresses.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·