The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company's official client.
Graham Cluley: AV shouldn’t just be something on your hard drive – it should be part of a global immune system
In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has changed - and the changes we all need to make for the future.
By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk - an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.
“Tens of millions” at risk from Filecoder due to “mass email spam event” targeting small businesses, British police agency warns
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET's official response.
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 - with a ticking timer before files are locked forever, according to US-CERT.
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his lab "jumps" from PC to PC using sound - and can be transmitted without any internet connection.
Users of Google's Chrome browser will be able to "purge" rogue plug-ins, after attacks where a supposedly helpful browser add-on contains malware - a tactic adopted by cybercriminals, as reported by We Live Security earlier this year.
If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.
We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.
Grand Theft Auto V sold more than $1 billion worth of units in a week - no wonder cybercriminals are tempted to cash in. A torrent offering the game on PC has been downloaded "thousands" of times, sites report.
Middle aged PC users routinely ignore warnings that sites may harm their computers - and that figure has doubled since 2011, according to research by ESET Ireland.
The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?
Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here are some of the latest traps laid by cybercriminals - and how to sidestep them.
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities - and discuss the evidence that Xunlei Networking Technologies is implicated.
Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware - with a new charger that lights up when it detects malicious software. For businesses, it could be a "last line of defense" against employees bringing infected devices to work.
There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of malware came to our attention mid-August because of its interesting anti-debugging and code injection techniques.
We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right now. We know that we don’t know. Today, ESET is releasing a simple tool to detect rootkits on OS X.