archives

Blog Archives

En Route with Sednit: Full Whitepaper

The full whitepaper “En Route with Sednit,” compiling parts 1-3.

En Route with Sednit – Part 3: A Mysterious Downloader

In the third and final part of our whitepaper “En Route with Sednit,” we describe a special downloader named Downdelph.

En Route with Sednit – Part 2: Observing the Comings and Goings

In the second part of our whitepaper “En Route with Sednit”, we focus on Sednit’s espionage toolkit, which is deployed on targets deemed interesting after a reconnaissance phase (described in the first part of the whitepaper).

En Route with Sednit – Part 1: Approaching the target

In the first part of our whitepaper “En Route with Sednit”, we focus on the methods used by the group to attack its targets, and on who these targets are.

Visiting the bear Den Presentation for REcon 2016

A journey in the land of (Cyber-) espionage – stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy. Visiting the Bear Den from ESET

Windows 10 security and privacy: An in-depth review and analysis

As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.

Operation Groundbait: Analysis of a surveillance toolkit

Operation Groundbait (Russian: Прикормка, Prikormka) is an ongoing cyber-surveillance operation targeting individuals in Ukraine. The group behind this operation has been launching targeted and possibly politically-motivated attacks to spy on individuals. This paper presents ESET’s findings about Operation Groundbait based on our re- search into the Prikormka malware family.

Data privacy and data protection: US law and legislation

Over the last four decades, the privacy of personal data has been the subject of legislation and litigation in both the US and the EU. Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services.

The Rise of Android Ransomware

Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.

Business Survey 2015

The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers.

Operation Buhtrap Presentation for AVAR2015

A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap. Operation Buhtrap – AVAR 2015 from ESET

ESET Trends 2016 – (In)security Everywhere

“Security is no longer just a problem for a few individuals but rather a problem involving more and more people”, explains ESET Research Laboratories in its annual trends paper. “2016 will be a most challenging year. We must face it with a proactive attitude of security awareness. “

Windows Exploitation in 2015

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.

Windows 10: Should you go there?

Windows 10: Should you go there?

How Safe are Australian Children in the Internet Age?

How Safe are Australian Children in the Internet Age?

Is Anti-Virus dead?

Is Anti-Virus dead?

Unpack Your Troubles: .NET packer tricks countermeasures

Marcin Hartung looks at different .NET packer tricks of the trade and the countermeasures deployed to deal with them.

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Liberpy’: Keyloggers and information theft in Latin America

Operation Liberpy’: Keyloggers and information theft in Latin America

Dissecting Linux/Moose

The Analysis of a Linux Router-based Worm
Hungry for Social Networks

Follow us

Copyright © 2016 ESET, All Rights Reserved.