Anton Cherepanov

Anton Cherepanov

Senior Malware Researcher


Education: Specialist degree in IT

Favorite activities? Traveling, reading

What is your golden rule for cyberspace? Use common sense

When did you get your first computer and what kind was it? In 1996 a 486DX4-100

Favorite computer game/activity? CTF games


34 articles by Anton Cherepanov

Windows zero-day CVE-2019-1132 exploited in targeted attacks

Windows zero-day CVE-2019-1132 exploited in targeted attacks

Windows zero-day CVE-2019-1132 exploited in targeted attacks

ESET research discovers a zero-day exploit that takes advantage of a local privilege escalation vulnerability in Windows

Anton Cherepanov10 Jul 20193 min. read


Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software

Anton Cherepanov14 May 20195 min. read


GreyEnergy: Updated arsenal of one of the most dangerous threat actors

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks

Robert Lipovsky and Anton Cherepanov17 Oct 20185 min. read


New TeleBots backdoor: First evidence linking Industroyer to NotPetya

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven

Robert Lipovsky and Anton Cherepanov11 Oct 20188 min. read


Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign

D-Link and Changing Information Technologies code-signing certificates stolen and abused by highly skilled cyberespionage group focused on East Asia, particularly Taiwan

Anton Cherepanov09 Jul 20182 min. read


A tale of two zero-days

A tale of two zero-days

A tale of two zero-days

Double zero-day vulnerabilities fused into one. A mysterious sample enables attackers to execute arbitrary code with the highest privileges on intended targets

Anton Cherepanov15 May 20184 min. read


Lazarus KillDisks Central American casino

Lazarus KillDisks Central American casino

Lazarus KillDisks Central American casino

The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.

Anton Cherepanov and Peter Kálnai03 Apr 20187 min. read


Analysis of TeleBots’ cunning backdoor

Analysis of TeleBots’ cunning backdoor

Analysis of TeleBots’ cunning backdoor

This article reveals details about the initial infection vector that was used during the DiskCoder.C outbreak.

Anton Cherepanov04 Jul 20176 min. read


TeleBots are back: Supply-chain attacks against Ukraine

TeleBots are back: Supply-chain attacks against Ukraine

TeleBots are back: Supply-chain attacks against Ukraine

This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.

Anton Cherepanov30 Jun 201710 min. read