Marc-Etienne M.Léveillé

Marc-Etienne M.Léveillé

Senior Malware Researcher


Education: Software Engineering student at École de Technologie supérieure

Highlights of your career? Winning the first Péter Szőr award for our research on Operation Windigo.

Position and history at ESET? Malware Researcher since January 2012

What malware do you hate the most? Malware that steals money or destroys documents

Favorite activities? Photography, Cycling, Playing the clarinet

When did you get your first computer and what kind was it? I remember playing with the TI-99 of my grandfather, but this first one I broke was his 486SX by editing the config.sys file incorrectly.

Favorite computer game/activity? CTF competitions


29 articles by Marc-Etienne M.Léveillé

ESET research

Evasive Panda leverages Monlam Festival to target Tibetans

Evasive Panda leverages Monlam Festival to target Tibetans

ESET research

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans

Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé07 Mar 202414 min. read


ESET research

A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

ESET research

A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository

Marc-Etienne M.Léveillé and Rene Holt12 Dec 20237 min. read


ESET research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 202312 min. read


ESET research

I see what you did there: A look at the CloudMensis macOS spyware

I see what you did there: A look at the CloudMensis macOS spyware

ESET research

I see what you did there: A look at the CloudMensis macOS spyware

Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs

Marc-Etienne M.Léveillé19 Jul 202211 min. read


ESET research

Watering hole deploys new macOS malware, DazzleSpy, in Asia

Watering hole deploys new macOS malware, DazzleSpy, in Asia

ESET research

Watering hole deploys new macOS malware, DazzleSpy, in Asia

Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs

Marc-Etienne M.Léveillé and Anton Cherepanov25 Jan 202210 min. read


COVID-19

Flaw in the Quebec vaccine passport: analysis

Flaw in the Quebec vaccine passport: analysis

COVID-19

Flaw in the Quebec vaccine passport: analysis

ESET cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec vaccine proof apps VaxiCode and VaxiCode Verif.

Marc-Etienne M.Léveillé31 Aug 20218 min. read


ESET research

Kobalos – A complex Linux threat to high performance computing infrastructure

Kobalos – A complex Linux threat to high performance computing infrastructure

ESET research

Kobalos – A complex Linux threat to high performance computing infrastructure

ESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos

Marc-Etienne M.Léveillé and Ignacio Sanmillan02 Feb 20215 min. read


ESET research

Mac cryptocurrency trading application rebranded, bundled with malware

Mac cryptocurrency trading application rebranded, bundled with malware

ESET research

Mac cryptocurrency trading application rebranded, bundled with malware

ESET researchers lure GMERA malware operators to remotely control their Mac honeypots

Marc-Etienne M.Léveillé16 Jul 202011 min. read


ESET research

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

ESET research

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks

Marc-Etienne M.Léveillé and Mathieu Tartare14 Oct 20196 min. read