AVAR 9th Edition

Already in its 9th edition, AVAR has established itself as an important security event where the information presented can be just as exotic as the locations where it’s held. The location chosen for this year’s edition was Auckland, New Zealand – the home of the Maori, the Kiwi and the “All Blacks”, the number one rugby team in the world. The architecture is just as impressive.

The subjects covered new threats such as mobile malware and VoIP attacks but also classic questions such as phishing, Virtual Machines, and last but not least, classification and virus naming.

An interesting presentation was given by Jonathan Poon from Microsoft, who spoke about their in-house release scanning system. This system is how Microsoft provides its software, both online and boxed, in a malware-free form. Jonathan maintains a personal weblog where he regularly writes about security and malware from his unique perspective. Feel free to check it out.

One of the most discussed subjects at AVAR 2006 has been the decreasing prevalence of global virus outbreaks and the huge rise in local and targeted attacks. Along with user education and security awareness, these will probably be our main focus points in 2007.

AVAR 9th Edition

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox