Organisers of the annual Virus Bulletin conference.
A little taste of what’s coming up at VB2025 🎬
We can’t wait to see so many of you in Berlin this September.
If you haven’t registered yet, now’s the time: Early Bird ends this week 🎟️
Secure your place now 👉https://tinyurl.com/4ujjvf7v
A teammate of mine worked on an interesting incident where the attackers connected to the backup server via RDP, launched the Chrome browser, and searched on Google for "VirtualBox".
The VirtualBox installer was then downloaded to the home directory of the compromised user:
C:\Users\<user>\Downloads\VirtualBox-7.1.6-167084-Win.exe
This file is a Windows installation package that the attacker used to set up a VirtualBox environment, allowing them to create an operating system without endpoint protection. The newly created virtual machine had the hostname "WIN-D1V1F70QJLC".
The attacker then logged into this newly created virtual machine to carry out further tasks without logging, antivirus, or EDR monitoring.