(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Digital Security

Inside fake Interac transfer and tax refund SMS phishing

Inside fake Interac transfer and tax refund SMS phishing

Digital Security

Inside fake Interac transfer and tax refund SMS phishing

It’s tax season in Canada and scammers are using fake tax refund forms to lure victims into supplying their personal information via phishing pages

Marc-Etienne M.Léveillé09 May 2018


ESET Research

Sednit update: Analysis of Zebrocy

Sednit update: Analysis of Zebrocy

ESET Research

Sednit update: Analysis of Zebrocy

Zebrocy heavily used by the Sednit group over last two years

ESET Research24 Apr 2018


Beware ad slingers thinly disguised as security apps

Beware ad slingers thinly disguised as security apps

Beware ad slingers thinly disguised as security apps

ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.

Lukas Stefanko05 Apr 2018


ESET Research

Lazarus KillDisks Central American casino

Lazarus KillDisks Central American casino

ESET Research

Lazarus KillDisks Central American casino

The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.

Peter Kálnai and Anton Cherepanov03 Apr 2018


Scams

Pingu Cleans Up: Subscription scam on Google Play

Pingu Cleans Up: Subscription scam on Google Play

Scams

Pingu Cleans Up: Subscription scam on Google Play

The game was uploaded to Google Play and attempted to trick users into unwittingly signing up for a weekly paid subscription

Lukas Stefanko29 Mar 2018


ESET Research

The Last Windows XP Security White Paper

The Last Windows XP Security White Paper

ESET Research

The Last Windows XP Security White Paper

Using the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer

Aryeh Goretsky27 Mar 2018


ESET Research

Glupteba is no longer part of Windigo

Glupteba is no longer part of Windigo

ESET Research

Glupteba is no longer part of Windigo

Latest ESET research strongly suggests that Glupteba is no longer tied to the infamous Operation Windigo.

Frédéric Vachon22 Mar 2018


ESET Research

Dangerous malware stealing bitcoin hosted on Download.com for years

Dangerous malware stealing bitcoin hosted on Download.com for years

ESET Research

Dangerous malware stealing bitcoin hosted on Download.com for years

ESET researchers dicovered that Trojanized applications used to steal bitcoin were hosted inadvertently by the popular website download.cnet.com.

Michal Poslušný and Peter Kálnai14 Mar 2018


ESET Research

OceanLotus ships new backdoor using old tricks

OceanLotus ships new backdoor using old tricks

ESET Research

OceanLotus ships new backdoor using old tricks

To smuggle the backdoor onto a targeted machine, the group uses a two-stage attack whereby a dropper package first gains a foothold on the system and sets the stage for the backdoor itself. This process involves some trickery commonly associated with targeted operations of this kind.

Tomáš Foltýn13 Mar 2018