ESET Research


2204 articles

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 2023


ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

Discarded, not destroyed: Old routers reveal corporate secrets

ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'

Cameron Camp and Tony Anscombe18 Apr 2023


ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems

ESET Research30 Mar 2023


ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds

Lukas Stefanko and Peter Strýček16 Mar 2023


ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group

Facundo Muñoz14 Mar 2023


ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information

Lukas Stefanko07 Mar 2023


ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol

Alexandre Côté Cyr02 Mar 2023


ESET Research

BlackLotus UEFI bootkit: Myth confirmed

BlackLotus UEFI bootkit: Myth confirmed

ESET Research

BlackLotus UEFI bootkit: Myth confirmed

The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality

Martin Smolár01 Mar 2023


ESET Research

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.

ESET Research28 Feb 2023