You never walk alone: The SideWalk backdoor gets a Linux variant
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
Education Studying Applied Computer Science at the Comenius University in Bratislava.
Position and history at ESET? Joined ESET as a Junior Malware Analyst in 2017.
Favorite computer game/activity I’ve always loved minesweeper.
What malware do you hate the most? The one not written from the heart.
Golden rule for cyberspace Question everything.
Highlights of your career? Currently being the author of articles which are (to be) placed under this bio.
When did you get your first computer and what kind was it? Around 2005, I think. I remember it as something with Windows XP.
Favorite activities Sports and reading.
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
Vladislav Hrčka, Thibaut Passilly and Mathieu TartareESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques
Vladislav HrčkaThere are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor
Vladislav HrčkaESET researchers discover a malware family with tools that show signs they’re used in targeted attacks
Vladislav HrčkaWe introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware
Vladislav HrčkaESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet
Vladislav HrčkaESET researchers have discovered that the criminals behind the Stantinko botnet are distributing a cryptomining module to the computers they control
Vladislav Hrčka