Virus Bulletin issue archive

The Bulletin is an indispensable source of reference for anyone concerned with the prevention, detection and removal of computer threats, including but not limited to malware and spam.

Between 1989 and 2014, VB published the monthly, subscriber-based Virus Bulletin magazine. The Bulletin is a continuation of that publication, but with more frequent releases - the Bulletin is available free of charge and requires no registration.

Virus Bulletin - December 2010

Commercial 'malware' production (comment); Android SMS trojans: new platform, 'old' tricks (malware analysis); Case study: the Ibank trojan (malware analysis); What's the deal with sender authentication? Part 5 (feature); VB 'securing your organization in the age of cybercrime' Seminar (conference report); VB2011 Barcelona (call for papers); VBSpam comparative review December 2010 (comparative review); VB100 comparative review on Windows 7 Professional (comparative review)

view issue as HTML | PDF

Virus Bulletin - November 2010

Worldwide anti-botnet initiatives (comment); Vancouver expedition (conference report); Deelaed learning (malware analysis); Exploit identification (tutorial); Anti-unpacker tricks - part fourteen (technical feature); Letters to the editor (letters);

view issue as HTML | PDF

Virus Bulletin - October 2010

Changing times (comment); It's just spam, it can't hurt, right? (malware analysis); Rooting about in TDSS (malware analysis); Anti-unpacker tricks - part thirteen (technical feature); On the relevance of spam feeds (feature); Things to come (review feature); VB100 comparative review on Windows Server 2003 (comparative review)

view issue as HTML | PDF

Virus Bulletin - September 2010

Breaking the habit (comment); The missing LNK (malware analysis); Injection as a way of life (malware analysis); Chim Chymine: a lucky sweep? (malware analysis); Anti-unpacker tricks - part eleven (technical feature); What's the deal with sender authentication? Part 4 (feature); VBSpam comparative review September 2010 (comparative review)

view issue as HTML | PDF

Virus Bulletin - August 2010

Apple pie order? (comment); Anti-unpacker tricks - part eleven (technical feature); Advanced exploit framework lab set-up (tutorial) HTML structure-based proactive phishing detection (feature); What's the deal with sender authentication? Part 3 (feature); VB100 - Windows Vista Business Edition Service Pack 2 (comparative review)

view issue as HTML | PDF

Virus Bulletin - July 2010

The dawn of the 'rogue AV testers' (comment); Hacking koobface (malware analysis); Anti-unpacker tricks - part ten (technical feature); The Indian subcontinent: part II (feature) What's the deal with sender authentication? Part 2 (feature); PC Tools Internet Security 2010 (product review); VBSpam comparative review (comparative review)

view issue as HTML | PDF

Virus Bulletin - June 2010

PWN2KILL, EICAR and AV: scientific and pragmatic research (comment); Anti-unpacker tricks - part nine (technical feature); MBR rootkit: beginnings (malware analysis); What's the deal with sender authentication? Part 1 (feature); EICAR 2010: rainy days in Paris (conference report); VB100 - Windows Server 2008 R2 (comparative review)

view issue as HTML | PDF

Virus Bulletin - May 2010

The best of... (comment); Anti-unpacker tricks - part eight (technical feature); TDSS infections - quarterly report (feature); Adapting to TxF (feature); Exploit kit explosion - part two: vectors of attack (tutorial); VBSpam comparative review (comparative review)

view issue as HTML | PDF

Virus Bulletin - April 2010

Are takedowns an exercise in futility? (comment); Evasions in Intrusion Prevention/Detection Systems (feature); Botnets, politics and hacktivism - an interesting partnership (feature); 'Signatures are dead.' 'Really? And what about pattern matching?' (feature); Exploit kit explosion - part one (tutorial); VB100 comparative review on Windows XP (comparative review)

view issue as HTML | PDF

Virus Bulletin - March 2010

Why flash web pages are like collateralized debt obligations (comment); Doin' the eagle rock (malware analysis); BackDoor.Tdss.565 and its modifications (aka TDL3) (malware analysis); The 26C3 Congress of the Chaos Computer Club (conference report); Memory analysis - examples (tutorial); CA Internet Security Suite Plus 2010 (product review); VBSpam comparative review (comparative review)

view issue as HTML | PDF

Virus Bulletin - February 2010

SSL certificate warnings - nuisance or value? (comment); Cut the Cutwail (malware analysis); Data tainting for malware analysis - part three (feature); Introduction to advanced memory analysis (tutorial); Novell SUSE Linux Enterprise Server 11 (comparative review)

view issue as HTML | PDF

Virus Bulletin - January 2010

The web of darkness (comment); It's a bird, it's a plane, it's Fooperman (malware analysis); Social science meets computer science (book review); AMTSOlutely fabulous (spotlight); The top ten spam, malware and e-security stories of 2009 (feature); Alwil avast! 5 (product review); VBSpam comparative review (comparative review)

view issue as HTML | PDF

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.