Bitdefender Research

Detecting and preventing Bluetooth Low Energy Attacks

Over the last two years or so a large number of research papers and presentations on security flaws in BLE devices came out. By far, the most prevalent hacks against BLE involve capturing handshakes, hard-coded keys and replay attacks. However, these papers and presentations are on the offensive side of this subject, describing different attacks […]

15 June 2020
It’s a file infector… it’s ransomware… it’s Virlock

Win32.Virlock with all its variations is both a new kind of file infector and ransomware (screen-locker) at the same time. In this paper, we aim to cover the techniques used by this virus and discuss methods that can be used to detect and disinfect systems affected by it. Virlock uses several techniques, including code-obfuscation, staged […]

17 August 2016
The Ransomware Strikes Back

It has been 24 years since the PC Cyborg trojan used to scramble file names and demand a ransom in return for restoring them. Since then, cybercriminal minds have engineered new methods for generating revenue. This paper presents the evolution of ransomware and the methods used. An analysis of over 2,000 representative samples (from a […]

17 August 2016