I see what you did there: A look at the CloudMensis macOS spyware
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
Education:Software Engineering student at École de Technologie supérieure
Highlights of your career? Winning the first Péter Szőr award for our research on Operation Windigo.
Position and history at ESET? Malware Researcher since January 2012
What malware do you hate the most? Malware that steals money or destroys documents
Favorite activities? Photography, Cycling, Playing the clarinet
When did you get your first computer and what kind was it? I remember playing with the TI-99 of my grandfather, but this first one I broke was his 486SX by editing the config.sys file incorrectly.
Favorite computer game/activity? CTF competitions
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
Marc-Etienne M.LéveilléHong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs
Marc-Etienne M.Léveillé and Anton CherepanovESET cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec vaccine proof apps VaxiCode and VaxiCode Verif.
Marc-Etienne M.LéveilléESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos
Marc-Etienne M.Léveillé and Ignacio SanmillanESET researchers lure GMERA malware operators to remotely control their Mac honeypots
Marc-Etienne M.LéveilléNew ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks
Marc-Etienne M.Léveillé and Mathieu TartareAsian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software
Marc-Etienne M.LéveilléESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, “The Dark Side of the ForSSHe”, they release analysis of 21 malware families to improve the prevention, detection and remediation of such threats
Marc-Etienne M.LéveilléCustomers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS
Marc-Etienne M.LéveilléIt’s tax season in Canada and scammers are using fake tax refund forms to lure victims into supplying their personal information via phishing pages
Marc-Etienne M.LéveilléRelating the collaboration between ESET experts and the FBI about the Windigo's operation, which ended with the sentencing of Maxim Senakh.
Marc-Etienne M.LéveilléA new ransomware outbreak today has hit some major infrastructure in Ukraine including Kiev metro. Here are some details about this new variant of Petya.
Marc-Etienne M.LéveilléThe strange behavior of a simple Windows application caught our attention and sparked the analysis by ESET of a previously undocumented malware.
Marc-Etienne M.LéveilléThis last month we have seen a new ransomware for Mac. Written in Swift, it is distributed on BitTorrent distribution site as “Patcher” for pirating popular software.
Marc-Etienne M.LéveilléESET has carried out analysis of new samples of the crypto-ransomware family TorrentLocker, to compare the 2016 campaigns against its research in late 2014.
Marc-Etienne M.LéveilléFor the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.
Marc-Etienne M.LéveilléOne year after the release of the technical analysis of the Mumblehard Linux botnet, it is no longer active. ESET, in collaboration with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the botnet, stopping its spamming activities.
Marc-Etienne M.LéveilléESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.
Michal Malik and Marc-Etienne M.LéveilléEarlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.
Marc-Etienne M.LéveilléToday, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.
Marc-Etienne M.Léveillé