White Papers

92 reports

Lemming Aid and Kool Aid: Helping the Community to help itself through Education

Lemming Aid and Kool Aid: Helping the Community to help itself through Education

This paper, presented at the 2014 AVAR conference, looks at the difficulties  and possibilities of implementing cooperative initiatives for teaching computer hygiene in a complex 21st century threatscape.


Hesperbot – A New, Advanced Banking Trojan in the Wild

Hesperbot – A New, Advanced Banking Trojan in the Wild

A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.


Six Months with Windows 8

Six Months with Windows 8

A look at Windows 8 during the first six months of its release. Just how well is it holding up, security-wise? The challenges faced by developers in securing Modern Windows and how piracy in the Windows Store might affect BYOD rollouts in the enterprise.


Advanced Evasion Techniques by Win32/Gapz

Advanced Evasion Techniques by Win32/Gapz

A presentation from the CARO workshop in May 2013, looking at the technology that makes Win32/Gapz arguably the most complex bootkit to date.


Boxer SMS Trojan

Boxer SMS Trojan

Analysis of an SMS Trojan found on Android smartphones that is capable of executing SMS premium rate scams in a wide range of countries. ESET researchers in Latin America combine code inspection with investigation of consumer forums to reveal the first threat of the kind targeting Latin American countries, but with implications that are global.


‘PokerAgent’

‘PokerAgent’

The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims. The threat was mostly active in Israel.


Trends for 2013 - Astounding growth of mobile malware

Trends for 2013 - Astounding growth of mobile malware

ESET Latin America's Malware Analysis Lab reviews the year and compiles threat trends for the upcoming season. So how will the 2013 threatscape look like according to the IT security company ESET? It will definitely see major growth of mobile malware and its variants, increased malware propagation via websites, continuing rise of botnets and attacks on the cloud resulting in information leaks.


The Passing Storm

The Passing Storm

The Storm botnet may have blown itself out, but its legacy remains. This paper places Storm in the context of botnets in general, examining its technical, social, and security implications.


OSX/Flashback

OSX/Flashback

The first malware to infect hundreds of thousands of Apple Mac