(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

New self-protecting USB trojan able to avoid detection

New self-protecting USB trojan able to avoid detection

New self-protecting USB trojan able to avoid detection

A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware, reports ESET's Tomáš Gardoň.

Tomáš Gardoň23 Mar 2016


Ransomware

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Ransomware

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Weeks after it started attacking and encrypting victims' information, Locky is still targeting many users. Here's what you need to know about this threat.

Josep Albors and Raphael Labaca Castro18 Mar 2016


Malware

Android banking trojan masquerades as Flash Player and bypasses 2FA

Android banking trojan masquerades as Flash Player and bypasses 2FA

Malware

Android banking trojan masquerades as Flash Player and bypasses 2FA

This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.

Lukas Stefanko09 Mar 2016


Malware

New Mac ransomware appears: KeRanger, spread via Transmission app

New Mac ransomware appears: KeRanger, spread via Transmission app

Malware

New Mac ransomware appears: KeRanger, spread via Transmission app

New ransomware infecting Apple OS X surfaced on March 4th, 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend.

Peter Stancik07 Mar 2016


ESET expert: Google Play porn clicker 'is a truly large-scale campaign'

ESET expert: Google Play porn clicker 'is a truly large-scale campaign'

ESET expert: Google Play porn clicker 'is a truly large-scale campaign'

Google Play porn clicker campaign: A single family of malicious apps masquerading as popular games or apps, designed to bypass Google’s security checks.

Editor24 Feb 2016


ESET Research

Porn clicker trojans at Google Play: An analysis

Porn clicker trojans at Google Play: An analysis

ESET Research

Porn clicker trojans at Google Play: An analysis

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Lukas Stefanko24 Feb 2016


The rise of Android ransomware

The rise of Android ransomware

The rise of Android ransomware

Lock-screen types and file-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. ESET has prepared a topical white paper on the growth of this insidious Android malware.

Robert Lipovsky and Lukas Stefanko18 Feb 2016


Secure Coding

How to isolate VBS or JScript malware with Visual Studio

How to isolate VBS or JScript malware with Visual Studio

Secure Coding

How to isolate VBS or JScript malware with Visual Studio

ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.

Diego Perez11 Feb 2016


ESET Research

Windows exploitation in 2015

Windows exploitation in 2015

ESET Research

Windows exploitation in 2015

Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET's annual Windows exploitation in 2015 report.

ESET Research26 Jan 2016