category

Malware

Another malware wave hits Europe, mainly downloading Locky ransomware

ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries.

Another Eurovision contestant? Even malware can ‘perform music’

In contrast to the Eurovision contestants, malware writers try to make their creations as stealthy as possible. But thanks to unique behavior and sometimes even unintended showmanship of their malicious code, they end up in the limelight.

FBI: No, you shouldn’t pay ransomware extortionists

The FBI has published a list of tips to reduce the chance of ransomware being the ruin of your company – and is keen that you don’t pay the extortionists.

Ransomware and the Internet of Things

A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future…

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices

ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.

ESET discovers new USB-based data stealing malware

ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection and reverse-engineering.

New self-protecting USB trojan able to avoid detection

A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware, reports ESET’s Tomáš Gardoň.

Android banking trojan masquerades as Flash Player and bypasses 2FA

This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.

New Mac ransomware appears: KeRanger, spread via Transmission app

New ransomware infecting Apple OS X surfaced on March 4th, 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend.

Razzies for malware: These were the worst performances of the year

Just as audiences have suffered from bad movie craftsmanship, IT users have had to endure the consequences of the malicious work done by malware authors. Welcome to Razzies for malware.

Porn clicker trojans keep flooding Google Play

ESET researchers have found 343 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.

Porn clicker trojans at Google Play: An analysis

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Biggest fears of EMEA companies? Malware ranks first

The most pressing IT security issue that companies in the EMEA region face is malware infection, reports Ondrej Kubovič. Enterprises are very worried.

How malware moved the exchange rate in Russia

After an investigation period, details were published about a unique cyberattack on a Russian bank where a malware placed trade orders for $500 million and heavily manipulated the ruble-dollar exchange rate.

How to isolate VBS or JScript malware with Visual Studio

ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.

Remtasu is disguising itself as a tool to appropriate Facebook accounts

Almost a year ago we warned about the spreading of Remtasu, and far from lessening, we have been able to identify numerous instances of this threat being propagated further.

Android has some critical remotely-exploitable security holes. But can you get the patch?

Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices.

But what about your smartphone? Is there a patch for you, and can you get your hands on it?

‘Application not compatible': Bayrob may be stealing your info

In this post, ESET’s Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.

Follow us

Copyright © 2016 ESET, All Rights Reserved.