White Papers

92 reports

Gazing at Gazer: Turla’s new second stage backdoor

Gazing at Gazer: Turla’s new second stage backdoor

Turla is a notorious group that has been targeting governments, government officials and diplomats for years. Although this backdoor has been actively deployed since at least 2016, it has not been documented anywhere. Based on strings found in the samples we analyzed, we have named this backdoor “Gazer”.


Stantinko: Teddy Bear Surfing Out of Sight

Stantinko: Teddy Bear Surfing Out of Sight

To get a global view of the Stantinko ecosystem, you need a lot of the pieces of the puzzle. The more we dug and tracked Stantinko, the more we could collect those pieces and put them together.


Win32/Industroyer: A new threat for industrial control systems

Win32/Industroyer: A new threat for industrial control systems

Win32/Industroyer is a sophisticated piece of malware designed to disrupt the working processes of industrial control systems (ICS).


Trends in Android ransomware

Trends in Android ransomware

Among other things, this paper delivers a definition of ransomware is provided; ESET’s detection telemetry is used to see the current trends for this cyberthreat; and detail on the most noteworthy Android ransomware examples since 2014 is provided.


Read The Manual

Read The Manual

In this paper, ESET's Matthieu Faou and Jean-Ian Boutin look at Read The Manual (RTM), a new group that has emerged on the international cybercrime scene. They cover the details of their tools, whom they target, and offer a rare glimpse into the type of operation they are carrying out.


IS GDPR good or bad news for business?

IS GDPR good or bad news for business?

Based on “A concise guide to the key provisions of the General Data Protection Regulation (GDPR)” by Kemp Jones Solicitors LLP.


En Route with Sednit – Part 3: A Mysterious Downloader

En Route with Sednit – Part 3: A Mysterious Downloader

In the third and final part of our whitepaper “En Route with Sednit,” we describe a special downloader named Downdelph.


En Route with Sednit – Part 1: Approaching the target

En Route with Sednit – Part 1: Approaching the target

In the first part of our whitepaper “En Route with Sednit”, we focus on the methods used by the group to attack its targets, and on who these targets are.


En Route with Sednit – Part 2: Observing the Comings and Goings

En Route with Sednit – Part 2: Observing the Comings and Goings

In the second part of our whitepaper “En Route with Sednit”, we focus on Sednit’s espionage toolkit, which is deployed on targets deemed interesting after a reconnaissance phase (described in the first part of the whitepaper).