aavar

31
Jan

Ransomware Double Extortion and Beyond: REvil, Clop, and Conti

The incorporation of double extortion is a turning point in the ongoing evolution of ransomware. Modern ransomware attacks follow the same modus operandi: Encrypt the targeted organizations’ files and demand payment in exchange for access restoration. However, since there is no guarantee that cybercriminals will keep their word, some organizations opt not to pay ransom, especially if they keep backup files anyway. But in late

Read more

24
Dec

FontOnLake: Previously unknown malware family targeting Linux

ESET researchers discovered a malware family with tools that show signs they’re used in targeted attacks. ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting operating systems running Linux. Modules used by this malware family, which we dubbed FontOnLake, are constantly under development and provide remote access to the operators, collect credentials, and

Read more

9
Aug

Structure and Directors

AVAR was founded in 1998 because of a perceived gap in coverage of anti-virus organisations. At that time Europe and the Americas were served by EICAR and Virus Bulletin, but researchers in Asia were left isolated. The observant reader might have noticed that our Memorandum and Articles of Association (M&A) lists the date of incorporation as 17th July 2013, so why

Read more

9
Aug

Welcome

Welcome to AVAR, whether you are a Member, thinking of becoming a Member, or just interested in finding out more about us. While other blogs here focus on technical topics, I will cover AVAR’s history, organisation and culture. This is information that usually spreads informally when we meet at conferences but, because of COVID-19, our 2020 conference was virtual and

Read more

30
Jun

2020 Virtual

2020 Virtual

X