Live now on YouTube, the #VB2024 playlist featuring more than 40 presentations from VB2024 in Dublin. Thank you to all the speakers!
https://www.youtube.com/playlist?list=PLffioUnqXWked4p7tCZL6UvKiG6rmNbWw
VB2024

YouTube
Trend Micro's Hara Hiroaki has written a blog post based on his presentation at VB2024 (#vb2024) about a new LODEINFO campaign connected to Earth Kasha and a correlation analysis with the APT10 Umbrella. https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella

LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals.

Trend Micro
Security researchers Rintaro Koike & Shota Nakajima have released a paper to accompany the research they presented at #VB2024 about the IcePeony APT group, which targets mainly Asian countries such as India and Vietnam. https://nao-sec.org/2024/10/IcePeony-with-the-996-work-culture.html
nao-sec.org

IcePeony with the '996' work culture - @nao_sec

nao-sec.org

Now that the dust has settled, thank you once again to everyone who came to #vb2024 and made it a great success - speakers, delegates, partners, chairpersons, poster presenters, A/V team, VB crew, students from National College of Ireland, and photographer Tim Berghoff for helping us record the event!

We hope to see you all again next year for VB2025 in Berlin (24 - 26 September)!

See Sharem in action, emulating a Windows shellcode: https://www.youtube.com/watch?v=S1PI9O-q6eM

I don't think it supports Linux shellcodes, does it? Also, I wonder what disassembler it uses.

NB. AI for Sharem was presented @VirusBulletin

#vb2024 #shellcode #emulation #disassembly

SHAREM shellcode analysis framework demo - emulation, disassembler, timeless debugging

YouTube
Virus Bulletin 2024 - Day I

What an amazing first day of the 34th edition of the Virus Bulletin Conference in Dublin! It was an intense day of very good presentations and meeting old and new friends. Last year, I wanted to write a summary of my conference days, but I made the mistake of leaving it 'for later,' and that never h

Virus Bulletin Final Highlights

Yesterday was the third and final day of the 34th Virus Bulletin Conference in Dublin, Ireland. It was a great three-day conference packed with very insightful talks.

Here is a summary of my day three at Virus Bulletin! I am very grateful for the opportunity to attend this conference and learn, exchange ideas, meet old friends, make new ones, and leave with my mind and heart full. Thank you o/

One more post to follow tomorrow because there are some talks that I still want to highlight :)
#VB2024
https://www.linkedin.com/pulse/virus-bulletin-2024-day-iii-veronica-valeros-o1nie/

Virus Bulletin 2024 - Day III

The third day and final day of the 34th edition of the Virus Bulletin Conference in Dublin has come to an end! There were many great talks today and a thought-provoking closing keynote to close the last day. Here are some of the best talks I've seen today, and be advised that, again, I am missing so

If you were an #vb2024 speaker make sure you put the speaker gift in the tray at airport security! Security should go a whole lot faster.

🎉 I am really thrilled to have won the 10th Péter Szőr award at @VirusBulletin. Congrats to all the authors of the nominated papers. They are all excellent pieces and know that I highly respect your work. It is very flattering to have our work recognized by our peers. #vb2024

https://infosec.exchange/@VirusBulletin/113248734129035293

Publishing exhaustive malware research paper is a _lot_ of work, and it wouldn't be possible for me without help. I'd like to thank our partners (NHTCU et al.) and the team @ESETresearch for technical and language reviews, as well as designers that render the final result.

If you are curious about our research, and to understand how a botnet of Linux servers has been around for 15 years stealing credit cards and cryptocurrency, and mangling HTTP traffic, the paper is available here: https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain/

Virus Bulletin (@[email protected])

Attached: 1 image Many congratulations to ESET researcher Marc-Etienne M.Léveillé (@marcetienne), winner of the 2024 Péter Szőr Award for Technical Security Research for his research "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain"! #vb2024 https://www.virusbulletin.com/conference/peter-szor-award/

Infosec Exchange