Connecting the dots: Exposing the arsenal and methods of the Winnti Group
New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks
New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks
ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users
Número dois in our series demystifying Latin American banking trojans
ESET researchers describe the latest components used in a recent Sednit campaign
ESET researchers discovered a backdoor linked to malware used by the Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East
ESET analysis breaks down the first known spyware that is built on the AhMyth open-source espionage tool and has appeared on Google Play – twice
ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers
The first in an occasional series demystifying Latin American banking trojans
Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor
ESET research reveals notorious crime group also conducting espionage campaigns for the past five years
ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure
The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS
ESET analysis uncovers a novel technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions
How a Montreal-made "social search engine" application has managed to become widely-spread adware, while escaping consequences
ESET researchers analyze new TTPs attributed to the Turla group that leverage PowerShell to run malware in-memory only
ESET researchers have analyzed fake cryptocurrency wallets emerging on Google Play at the time of bitcoin’s renewed growth
ESET sheds light on commands used by the favorite backdoor of the Sednit group
ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software
ESET research uncovers Microsoft Exchange malware remotely controlled via steganographic PDF and JPG email attachments
Criminal activities against accountants on the rise – Buhtrap and RTM still active