ESET Research


2279 articles

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal

Martin Smolár12 Sep 2025


GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results

Fernando Tavella04 Sep 2025


First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats

Anton Cherepanov and Peter Strýček26 Aug 2025


Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets

Anton Cherepanov, Peter Strýček, Damien Schaeffer11 Aug 2025


ToolShell: An all-you-can-eat buffet for threat actors

ToolShell: An all-you-can-eat buffet for threat actors

ToolShell: An all-you-can-eat buffet for threat actors

ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities

ESET Research24 Jul 2025


Unmasking AsyncRAT: Navigating the labyrinth of forks

Unmasking AsyncRAT: Navigating the labyrinth of forks

Unmasking AsyncRAT: Navigating the labyrinth of forks

ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants

Nikola Knežević15 Jul 2025


Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024

Zoltán Rusnák02 Jul 2025


ESET Threat Report H1 2025

ESET Threat Report H1 2025

ESET Threat Report H1 2025

A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč26 Jun 2025


BladedFeline: Whispering in the dark

BladedFeline: Whispering in the dark

BladedFeline: Whispering in the dark

ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig

ESET Research05 Jun 2025