Virus Bulletin issue archive

The Bulletin is an indispensable source of reference for anyone concerned with the prevention, detection and removal of computer threats, including but not limited to malware and spam.

Between 1989 and 2014, VB published the monthly, subscriber-based Virus Bulletin magazine. The Bulletin is a continuation of that publication, but with more frequent releases - the Bulletin is available free of charge and requires no registration.

Virus Bulletin - December 2008

Public liability insurance for computer intrusion (comment); Anti-unpacker tricks - part one (technical feature); Repercussions of dynamic testing (opinion); Frame4: in the picture (spotlight); VB100 on Windows Vista x64 (comparative review)

view issue as HTML | PDF

Virus Bulletin - November 2008

Co-operation is the only way (comment); XXX racted (malware analysis); Your filters are bypassed: Rustock.C in the kernel (malware analysis); Family matters (opinion) The Ottawa rules (conference report); DriveSentry Desktop 3.1/3.2 & GoAnywhere 1.0.2/2.0 (product review)

view issue as HTML | PDF

Virus Bulletin - October 2008

The cost of online anonymity (comment); Wither the Harumf (malware analysis); The hidden cost of compromise (feature); Broadly speaking: skill diversification in the AV community (opinion) Windows Server 2008 (comparative review)

view issue as HTML | PDF

Virus Bulletin - September 2008

Does the punishment fit the crime? (comment); Prophet and loss (malware analysis); All your MP3s are belong to us (malware analysis); VB2008 call for last-minute papers (call for papers); Il buono, il brutto, il cattivo (book review); Malware teaching considered harmful? (opinion); Lavasoft Ad-Aware 2008 (product review)

view issue as HTML | PDF

Virus Bulletin - August 2008

The secret life of old malware (comment); 'Yet another Rustock analysis...' (rootkit analysis); The case for AV for Linux: Linux/Rst-B (feature); Improving heuristics (feature); VB100 on Windows XP SP3 (comparative review)

view issue as HTML | PDF

Virus Bulletin - July 2008

A commitment to quality and reliability (comment); The road less truvelled: W32/Truvel (virus analysis); New memory persistence threats (feature); Reversing Python modules (feature); Advertising database poisoning (feature); Sunbelt Software VIPRE Antivirus + Antispyware (product review)

view issue as HTML | PDF

Virus Bulletin - June 2008

The good, the bad and the blurring boundaries (comment); Metafile art class (feature); Strike me down, and I shall become more powerful! (feature); System cleaning: getting rid of malware from infected PCs (feature); EICAR 2008, c'était merveilleux! (conference report); VB100: Ubuntu Linux 8.04LTS Server Edition (comparative review)

view issue as HTML | PDF

Virus Bulletin - May 2008

Online banking call to arms (comment); Algorithms for grouping similar samples in malware analysis (feature); Metamorphic authorship recognition using Markov models (feature); Blended malware defence (opinion); eEye Digital Security Blink Professional 4.0 (product review)

view issue as HTML | PDF

Virus Bulletin - April 2008

Political DDoS around the world (comment); Your computer is now stoned (...again!) (malware analysis); Anti-stealth fighters: testing for rootkit detection and removal (feature); Windows Vista Business Edition SP1 (comparative review)

view issue as HTML | PDF

Virus Bulletin - March 2008

Home (page) renovations (comment); Pandex: the botnet that could (feature); Exepacker blacklisting part 3 (feature); Black Hat DC and CCC 24C3 (conference report); AVG Internet Security 8 (product review)

view issue as HTML | PDF

Virus Bulletin - February 2008

Malware vs. anti-malware: (how) can we all survive? (comment); Crimea river (virus analysis); How to disable WFP using physical disk information (virus analysis); Assessment war: Windows services (feature); VB2008 Ottawa (call for papers); Windows Server 2003 (comparative review)

view issue as HTML | PDF

Virus Bulletin - January 2008

A richer, but more dangerous web (comment); Botnet monitoring (feature); Rule-driven malware identification and classification (feature); Inside rogue Flash ads (feature); VB2008 Ottawa (call for papers); Agnitum Outpost Security Suite Pro 2008 (product review)

view issue as HTML | PDF

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.