A grown-up industry

2014-05-01

Martijn Grooten

Virus Bulletin, UK
Editor: Helen Martin

Abstract

‘We plan to increase our scope further and look even more at other areas of IT security.’ Martijn Grooten


Table of contents

The recently announced [1] changes at Virus Bulletin have given us plenty of reason to look forward. But they have also provided us with an excuse to look back at the 25 year history of the company.

One episode that is remembered with a mixture of nostalgia and frustration at VB’s headquarters is that of W97M/ColdApe [2], a 1999 virus that, among other things, sent an email from each infected machine to [email protected], the email address of erstwhile VB Editor Nick FitzGerald.

Reading about ColdApe, I couldn’t help but notice how much things have changed in the last 15 years. A discussion I stumbled across between Nick and the author of the virus [3] on the alt.comp.anti-virus newsgroup not only highlighted the fact that such dialogues took place frequently and in the open, but it also gave the impression of mere child’s play compared with the threats we see today that are perpetrated by organized criminals and nation states.

At the same time, the distinction between good and bad was always very clear: there were those writing the viruses and those fighting them, and the two were separate worlds. The idea that someone from one of those worlds could find employment in the other was unthinkable – and has been the topic of many heated discussions at VB conferences over the years.

Many security researchers still make a distinction between good and bad actors, though there is increasing disagreement over who fits into which category. There is even less agreement on which actions are bad – and quite often it depends on the circumstances. Running a device at the corporate gateway to prevent employees from accessing malicious websites is generally considered an advisable thing to do.

Running the same device at a country’s ISPs to prevent its citizens from accessing websites that are not in line with the government’s view is considered by most to be heavy censorship.

Hacking into a company’s website to steal data relating to millions of its customers is a very serious crime. Hacking into the same website to demonstrate the existence of a vulnerability could result in the site owner awarding the hacker a bug bounty in appreciation.

A few years ago, we quietly changed the tagline of the VB website from ‘fighting malware and spam’ to ‘covering the global threat landscape’. This was not because we considered that malware and spam were no longer interesting, but because we realized that fighting them could only be done in a broader security context.

As Virus Bulletin is going through some big changes, we plan to increase our scope further and look even more at other areas of IT security – of course, while continuing to report on malware and spam.

Through both the VB conference and Virus Bulletin magazine, VB has shared the details of high quality research and thought-provoking opinions. We will continue to do so, and our new publication format will certainly help with that.

We will also be on the look-out for contributions from researchers working in different areas of security – or perhaps with a different view on security. The well known expression states that great minds think alike, but in fact, great minds often think in very different ways, and bringing them together can lead to even greater things.

Great minds tend to have strong opinions too. (At least those in security do – after all, security matters.) It will be inevitable that some of the things we publish will cause some controversy: people may disagree with an opinion expressed, with some research that is being performed or even with the ethics behind that research. We’re a grown-up industry, and we should be able to deal with such controversies. It will benefit us all.

Here’s to the next 25 years!

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.