Founding of AMTSO

In case you missed it: recently more than 40 anti-malware researchers and testers got together in Bilbao, Spain, to formalize the charter of the Anti-Malware Testing Standards Organisation (AMTSO). The organization’s main aim is to create security software testing guidelines and standards.

Why is a body like this needed? Well, although security software has changed enormously in the last ten years, most tests used today haven’t evolved at the same rate. New and better tests are needed to better assess the effectiveness of new technologies. AMTSO is a very significant move towards having tests that more accurately reflect the performance of security software in real life situations.

I was part of the initial talks about this way back during the AV Testing Workshop, and it’s clear that with this new organization, we’ve come a long way.

Right now the group consists of AV researchers and testers. One of the goals is to include academics as well. AMTSO strives to be vendor and technology neutral and academic members will be very helpful in ensuring this position.

It’ll be interesting to see what AMTSO comes up with it. As a member of the pro tem standards and guidelines subcommittee I’ll obviously have a say in the matter. The result may be that we end up with tests where security solutions don’t score as highly as they do in current tests. But this will be no bad thing if test results reflect the genuine ability of solutions to combat today’s constantly changing threats.

Read more about the organization here

Founding of AMTSO

Your email address will not be published. Required fields are marked *



Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox