Mitos sobre malware #1: todo es virus

Existen muchos mitos sobre malware: quién los crea, qué tipos hay, si el phishing es malware… en esta serie de entregas buscaremos aclararlos y contarles más acerca de sus detalles.

When malware goes bad: an historical sampler

A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?

Scary Code: Top 5 malware that kept researchers up at night

If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Recently, our anti-virus laboratory discovered an interesting new modification of a file virus known as Expiro which targets 64-bit files for infection. File-infecting viruses are well known and have been studied comprehensively over the years, but malicious code of this type almost invariably aimed to modify 32-bit files. One such family of file viruses, called

Small business cybercrime costs $6,000 a year, says British group

Cybercrime is costing small businesses an average of £4,000 ($6000) a year, according to the British Federation of Small Businesses (FSB). A report by the group found that 41 per cent of the FSB’s membership have been a victim of cybercrime in the past year. The most common threat is virus infections, with 20% of small businesses falling victim – while 8% have been victims of hacking and 5% have suffered security breaches.

ComboFix fixed: popular utility safe to use

ESET’s threat researchers received a surprise earlier this week when they began receiving reports from ESET LiveGrid that downloads of ComboFix, a tool popular with advanced users for removing malware, were detected as being infected by a variant of the Sality virus, Win32/Sality.NBA.

Scandal video of Justin Bieber: just don’t click here!

I received a “shared” messages from a friend about “a leaked scandal video of Justin Bieber and Selana Gomez” promising a “naked Justin Bieber”, with a Photoshopped picture, which we – for family-friendliness – censored a bit.

Stray cat used as bait in Japanese hacking plot

In a story that could be lifted direct from a Hollywood script, a Japanese hacker placed a memory card on the collar of a stray cat found wandering on an island near Tokyo.

Análisis técnico de ACADMedre.A

Mucho se ha estado hablando en los últimos días sobre el gusano utilizado para espionaje industrial ACAD/Medre.A, el siguiente articulo detallara el accionar que tiene dicho gusano para cumplir con su cometido. ACAD/Medre.A es un gusano escrito en AutoLISP, una variante del lenguaje LISP usado en AutoCAD. A grandes rasgos, el código malicioso realiza las

The Induc Virus is back!

ESET has discovered a new version of the Delphi infector, Win32/Induc. Unlike its predecessors, however, this variant incorporates a seriously malicious payload and has acquired some extra file infection and self-replicative functionality. Two years ago, we published comprehensive information (here , here, and here) about the virus Win32/Induc.A, which infected Delphi files at compile-time. Though

The more things change, the more they stay the same

It's something of a truism, that 'old viruses never die', and that certainly seems to be the case for some of the older, more widespread, email worms. In this interview (http://www.signonsandiego.com/uniontrib/20041129/news_lz1b29five.html) back in 2004, I talked about an email worm called "Win32/Zafi.b" which, at the time, had recently been spreading on a global scale. However,

Nueva generación de botnets: TDL4 / TDSS

Como sabemos, cada cierto tiempo (cada vez menor) el nivel de sofisticación del malware aumenta. Nuevas técnicas y métodos de evasión y de propagación son desarrolladas por los creadores de malware día a día. Luego de que el famoso gusano Stuxnet fuera descubierto a mediados del año pasado y su complejo funcionamiento e intenciones fueron

Yesterday’s Virus Hoax is Today’s Fake Utility

One of the (few) blessings of having been so long in this industry is that I remember a time when most malware was viral and Trojans were rare: so rare, in fact, that there was at one time a notorious "dirty dozen" set of Trojans.  At around the same time, there were innumerable hoaxes describing malware with

Me infecté, ¿y ahora qué hago? – Parte II

El día de hoy les traemos la segunda entrega del post de la semana pasada, donde detallábamos cómo deben proceder si fueron víctimas de una infección y no poseían una solución antivirus. Anteriormente les brindamos un procedimiento básico de como identificar, localizar y posteriormente eliminar dicha amenaza, pero no profundizamos demasiado en qué se debe

Me infecté, ¿y ahora qué hago? – Parte I

Incontables veces hemos explicado en este blog cómo evitar ser víctimas del malware, pero… ¿qué hay con aquellos lectores que sí se infectaron y no disponían de una solución antivirus? Bueno, este post es para ustedes, ya que aquí explicaremos qué acciones les recomendamos tomar para recuperar el control de su equipo y evitar una

Supertrojan Supersighs Me

Zeus-associated malware (and that includes SpyEye and “SpyZeuS”) isn’t supernaturally difficult to detect. It is, however, pretty adaptive and has introduced, from time to time, some innovative counter-detection techniques.

Resumen de amenazas de septiembre

Como indicamos en reportes anteriores, el ambiente delictivo, en relación al desarrollo y propagación de amenazas, se encuentra de forma constante buscando nuevas  formas para lograr mayores indices de infección. Septiembre se caracterizó por presentar un crisol de metodologías de ataque y de propagación de amenazas bastante particular. Como todos los meses les presentamos un

Malware: una ensalada de virus, gusanos, troyanos…

Es muy frecuente que en los seminarios que visitamos con la Gira Antivirus se converse sobre lo correcto o incorrecto de utilizar indistintamente los términos malware (o en español código malicioso) y virus. El término virus fue el primero en ser acuñado por la comunidad de la seguridad ya que fueron las primeras variantes de

Virus, Anti-Virus, Fake Anti-Virus

Round here, we're more than a little concerned about fake/rogue antivirus (and other fake security software). It's an ugly form of ransomware that hurts its victims in many ways. It scares them by threatening dire consequences and damage from malware that doesn't exist (except in the sense that the fake AV is itself malware), in

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

6 articles related to:
Hot Topic
ESET Virus Radar


Select month
Copyright © 2015 ESET, All Rights Reserved.