ESET Research

ESET Research



610 articles by ESET Research

ESET research

Sednit update: Analysis of Zebrocy

Sednit update: Analysis of Zebrocy

ESET research

Sednit update: Analysis of Zebrocy

Zebrocy heavily used by the Sednit group over last two years

ESET Research24 Apr 201812 min. read


ESET research

Sednit update: How Fancy Bear Spent the Year

Sednit update: How Fancy Bear Spent the Year

ESET research

Sednit update: How Fancy Bear Spent the Year

Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.

ESET Research21 Dec 201712 min. read


ESET research

OSX/Proton spreading again through supply-chain attack

OSX/Proton spreading again through supply-chain attack

ESET research

OSX/Proton spreading again through supply-chain attack

Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.

ESET Research20 Oct 20174 min. read


ESET research

DoubleLocker: Innovative Android Ransomware

DoubleLocker: Innovative Android Ransomware

ESET research

DoubleLocker: Innovative Android Ransomware

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.

ESET Research13 Oct 20173 min. read


Less Technical

Mid-year review: Have our security trends for 2017 become reality?

Mid-year review: Have our security trends for 2017 become reality?

Less Technical

Mid-year review: Have our security trends for 2017 become reality?

We are halfway through the year and it is a good opportunity to analyze the extent to which the ideas we gathered in the Trends 2017: Security Held Ransom report have come true.

ESET Research20 Jul 20179 min. read


ESET research

Sednit adds two zero-day exploits using 'Trump's attack on Syria' as a decoy

Sednit adds two zero-day exploits using 'Trump's attack on Syria' as a decoy

ESET research

Sednit adds two zero-day exploits using 'Trump's attack on Syria' as a decoy

Sednit is back - this time with two more zero-day exploits embedded in a phishing email titled Trump's_Attack_on_Syria_English.docx.

ESET Research09 May 201713 min. read


ESET research

Linux Shishiga malware using LUA scripts

Linux Shishiga malware using LUA scripts

ESET research

Linux Shishiga malware using LUA scripts

The usage of the BitTorrent protocol and Lua modules separates Linux/Shishiga from other types of malware, according to analysis by ESET.

ESET Research and Michal Malik25 Apr 201712 min. read


ESET research

Sathurbot: Distributed WordPress password attack

Sathurbot: Distributed WordPress password attack

ESET research

Sathurbot: Distributed WordPress password attack

This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weak WordPress administrator accounts.

ESET Research06 Apr 20179 min. read


ESET research

Carbon Paper: Peering into Turla’s second stage backdoor

Carbon Paper: Peering into Turla’s second stage backdoor

ESET research

Carbon Paper: Peering into Turla’s second stage backdoor

The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.

ESET Research30 Mar 201726 min. read