Robert Lipovsky

Robert Lipovsky

Principal Threat Intelligence Researcher


Education? Master’s Degree in Computer Science from the Slovak University of Technology in Bratislava

Highlights of your career? Giving presentations at several security conferences, including EICAR, CARO, and Virus Bulletin.

Position and history at ESET? Malware Researcher since 2007, currently holds the position Security Intelligence Team Lead.

What malware do you hate the most? Grayware/PUAs – when malware authors complain about detection and try to convince you they’re not malware.

Favorite activities? Snowboarding, listening to music, playing guitar…

What is your golden rule for cyberspace? Be reasonably paranoid..

When did you get your first computer and what kind was it? During primary school. It was an Intel 8088 palmtop, used it for programming in GW-BASIC 

Favorite computer game/activity? Project I.G.I.


49 articles by Robert Lipovsky

Cybercrime

New wave of cyberattacks against Ukrainian power industry

New wave of cyberattacks against Ukrainian power industry

Cybercrime

New wave of cyberattacks against Ukrainian power industry

ESET has discovered a new wave of cyberattacks attacks against Ukraine's electric power industry. Interesting, the malware that was used is not BlackEnergy.

Robert Lipovsky20 Jan 20164 min. read


Cybercrime

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

Cybercrime

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

The recent attacks on the electrical power industry in Ukraine are connected to attacks on the media and to targeted cyber-espionage attacks against Ukrainian governmental agencies.

Robert Lipovsky04 Jan 20165 min. read


ESET research

The Trojan Games: Odlanor malware cheats at poker

The Trojan Games: Odlanor malware cheats at poker

ESET research

The Trojan Games: Odlanor malware cheats at poker

Every now and again, ESET comes across an attack that "stands out". Odlanor malware fits that bill - this unique trojan targets players of online poker.

Robert Lipovsky17 Sep 20153 min. read


ESET research

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit

ESET research

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.

Robert Lipovsky and Anton Cherepanov30 Jul 20153 min. read


Apps on Google Play Steal Facebook Credentials

Apps on Google Play Steal Facebook Credentials

Apps on Google Play Steal Facebook Credentials

Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.

Robert Lipovsky09 Jul 20152 min. read


ESET research

Virlock: First Self-Reproducing Ransomware is also a Shape Shifter

Virlock: First Self-Reproducing Ransomware is also a Shape Shifter

ESET research

Virlock: First Self-Reproducing Ransomware is also a Shape Shifter

Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such combination of malware features has been observed.

Robert Lipovsky22 Dec 20148 min. read


ESET research

Korplug military targeted attacks: Afghanistan & Tajikistan

Korplug military targeted attacks: Afghanistan & Tajikistan

ESET research

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

Robert Lipovsky and Anton Cherepanov12 Nov 20147 min. read


ESET research

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

ESET research

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

Robert Lipovsky14 Oct 20142 min. read


ESET research

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

ESET research

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

Robert Lipovsky22 Sep 20145 min. read