ESET Threat Report Q4 2020
A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
ESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos
ESET researchers uncover a supply-chain attack used in a cyberespionage operation targeting online‑gaming communities in Asia
Another in our occasional series demystifying Latin American banking trojans
ESET researchers uncover attacks targeting Colombian government institutions and private companies, especially from the energy and metallurgical industries
ESET researchers have uncovered a supply-chain attack on the website of a government in Southeast Asia.
LuckyMouse, TA428, HyperBro, Tmanger and ShadowPad linked in Mongolian supply-chain attack
ESET researchers discover a new backdoor used by Turla to exfiltrate stolen documents to Dropbox
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
Backdoor authors show deep knowledge of the targeted POS software, decrypting database passwords from Windows registry values
A view of the Q3 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Throughout its monitoring, ESET analyzed thousands of malicious samples every month to help this effort
ESET researchers uncover a new APT group that has been stealing sensitive documents from several governments in Eastern Europe and the Balkans since 2011
ESET researchers discover surprisingly many indicators of close cooperation among Latin American banking trojans’ authors
ESET researchers uncover a new version of Android spyware used by the APT-C-23 threat group against targets in the Middle East
ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches
ESET researchers analyze a previously undocumented trojan that is spread via malicious torrents and uses multiple tricks to squeeze cryptocoins from its victims while staying under the radar
Beware the tax bogeyman – there are tax scams aplenty
Another in our occasional series demystifying Latin American banking trojans
We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware