(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

ESET Research

Corkow: Analysis of a business-oriented banking Trojan

Corkow: Analysis of a business-oriented banking Trojan

ESET Research

Corkow: Analysis of a business-oriented banking Trojan

Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.

Robert Lipovsky and Anton Cherepanov27 Feb 2014


ESET Research

An In-depth Analysis of Linux/Ebury

An In-depth Analysis of Linux/Ebury

ESET Research

An In-depth Analysis of Linux/Ebury

In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.

Marc-Etienne M.Léveillé21 Feb 2014


ESET Research

Corkow: analysis of a business-oriented banking Trojan

Corkow: analysis of a business-oriented banking Trojan

ESET Research

Corkow: analysis of a business-oriented banking Trojan

In his blog post last week, Graham Cluley introduced the Win32/Corkow banking trojan. The malware has demonstrated continuous activity in the past year, infecting thousands of users - various indicators point to the fact the malware authors are continually developing the trojan.

Robert Lipovsky and Anton Cherepanov21 Feb 2014


ESET Research

Windows exploitation in 2013

Windows exploitation in 2013

ESET Research

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

ESET Research11 Feb 2014


Rob Slade: The truth about quantum cryptography - and what it means for privacy

Rob Slade: The truth about quantum cryptography - and what it means for privacy

Rob Slade: The truth about quantum cryptography - and what it means for privacy

'The first thing you need to know about quantum cryptography is that it isn't cryptography. At least, not the quantum part,' writes Rob Slade, information security researcher, author and malware expert.

Guest Author24 Jan 2014


Malware

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

Malware

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.

Joan Calvet17 Jan 2014


Video

Getting started with Bitcoin

Getting started with Bitcoin

Video

Getting started with Bitcoin

Everyone is talking about Bitcoin but is it a safe investment for your savings? We Live Security has five tips for protecting yourself against cybercriminals.

Editor15 Jan 2014


Malware

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

Malware

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.

Joan Calvet14 Jan 2014


Malware

The Death of Anti-Virus: conference paper

The Death of Anti-Virus: conference paper

Malware

The Death of Anti-Virus: conference paper

David Harley19 Dec 2013