(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

Bad Rabbit: Not-Petya is back with improved ransomware

Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

A new ransomware outbreak today has hit some major infrastructure in Ukraine including Kiev metro. Here are some details about this new variant of Petya.

Marc-Etienne M.Léveillé24 Oct 2017


ESET Research

Fake cryptocurrency trading apps on Google Play

Fake cryptocurrency trading apps on Google Play

ESET Research

Fake cryptocurrency trading apps on Google Play

With all the hype around cryptocurrencies, cybercriminals are trying to grab whatever new opportunity they can – be it hijacking users’ computing power to mine cryptocurrencies via browsers or by compromising unpatched machines, or various scam schemes utilizing phishing websites and fake apps.

Lukas Stefanko23 Oct 2017


ESET Research

OSX/Proton spreading again through supply-chain attack

OSX/Proton spreading again through supply-chain attack

ESET Research

OSX/Proton spreading again through supply-chain attack

Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.

ESET Research20 Oct 2017


ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker: Innovative Android Ransomware

ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.

ESET Research13 Oct 2017


ESET Research

Money-making machine: Monero-mining malware

Money-making machine: Monero-mining malware

ESET Research

Money-making machine: Monero-mining malware

While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.

Peter Kálnai and Michal Poslušný28 Sep 2017


ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

BankBot trojan returns to Google Play with new tricks

ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

The Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again and contains new tricks designed to get access to the private banking information of the user.

Lukas Stefanko25 Sep 2017


ESET Research

New FinFisher surveillance campaigns: Internet providers involved?

New FinFisher surveillance campaigns: Internet providers involved?

ESET Research

New FinFisher surveillance campaigns: Internet providers involved?

FinFisher has extensive spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are the controversies around its deployments.

Filip Kafka21 Sep 2017


ESET Research

Cryptocurrency web mining: In union there is profit

Cryptocurrency web mining: In union there is profit

ESET Research

Cryptocurrency web mining: In union there is profit

Cryptocurrency mining has been used by cybercriminals to make a quick and easy profit while corrupting the victim’s machine in the process.

Matthieu Faou14 Sep 2017


ESET Research

DownAndExec: Banking malware utilizes CDNs in Brazil

DownAndExec: Banking malware utilizes CDNs in Brazil

ESET Research

DownAndExec: Banking malware utilizes CDNs in Brazil

Services like Netflix use content delivery networks (CDNs) to maximize bandwidth usage. However, the CDNs might be becoming a new way of spreading malware.

Cassius Puodzius13 Sep 2017