Malware


437 articles

Stuxnet: Cyberwarfare’s Universal Adaptor?

Stuxnet: Cyberwarfare’s Universal Adaptor?

Stuxnet: Cyberwarfare’s Universal Adaptor?

ESET Research14 Oct 2010


Open Source Malware Fingerprinting – Free Tool

Open Source Malware Fingerprinting – Free Tool

Open Source Malware Fingerprinting – Free Tool

ESET Research26 Aug 2010


Aryeh’s Mousing Memoirs

Aryeh’s Mousing Memoirs

Aryeh’s Mousing Memoirs

“Written in the form of a personal retrospective, this paper compares the earliest days of PC computer viruses with today’s threats, as well as provides a glimpse into the origins of the computer anti-virus industry.”

David Harley16 Jul 2010


Stock Manipulation Botnets Gain Ground

Stock Manipulation Botnets Gain Ground

Stock Manipulation Botnets Gain Ground

ESET Research22 Jun 2010


Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

ESET Research09 Jun 2010


Banking Fraud? Tell me and tell me quick!

Banking Fraud? Tell me and tell me quick!

Banking Fraud? Tell me and tell me quick!

In the survey, banks that were notifying consumers as quickly as possible or immediately across multiple channels performed well [and] they also improved cardholder confidence. Notifications over multiple channels were also significant.

ESET Research26 May 2010


Library of Congress Acquires Entire Twitter Archive

Library of Congress Acquires Entire Twitter Archive

Library of Congress Acquires Entire Twitter Archive

Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is being used for more command and control functionality. As soon as it becomes available, we’ll follow up. :)

ESET Research25 May 2010


Bricking your cell phone: Mayhem on a Massive Scale

Bricking your cell phone: Mayhem on a Massive Scale

Bricking your cell phone: Mayhem on a Massive Scale

What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.

ESET Research24 May 2010


Continued Malware Hijinks with Mass Webserver Compromises

Continued Malware Hijinks with Mass Webserver Compromises

Continued Malware Hijinks with Mass Webserver Compromises

While the jury’s still out about whether the intent of the past month’s mass webserver breaches are fully criminal, Dancho reports new developments which also link Koobface activity into this command and control structure: Yet another mass sites compromise is currently taking place, this time targeting DreamHost customers, courtesy of the same gang behind the U.S Treasury/GoDaddy/NetworkSolutions mass compromise campaigns.

ESET Research12 May 2010