(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

ESET Research

Nymaim - obfuscation chronicles

Nymaim - obfuscation chronicles

ESET Research

Nymaim - obfuscation chronicles

We look at malware delivered by a campaign that has infected thousands of websites around the world - and the various control flow obfuscation techniques that make its analysis as interesting as it is challenging.

Jean-Ian Boutin26 Aug 2013


Malware

Orbital Decay: the dark side of a popular file downloading tool

Orbital Decay: the dark side of a popular file downloading tool

Malware

Orbital Decay: the dark side of a popular file downloading tool

Orbit Downloader by Innoshock is a popular browser add-on often used to download embedded videos from sites such as YouTube. But the popular add-on has disturbing hidden functions.

Aryeh Goretsky21 Aug 2013


ESET Research

Avatar rootkit: the continuing saga

Avatar rootkit: the continuing saga

ESET Research

Avatar rootkit: the continuing saga

In this blog post we confirm that the Avatar rootkit continues to thrive in the wild, and disclose some new information about its kernel-mode self-defense tricks. We continue our research into this malware family.

Aleksandr Matrosov and Anton Cherepanov21 Aug 2013


Radar Love: how classic rock helps to highlight Java problems

Radar Love: how classic rock helps to highlight Java problems

Radar Love: how classic rock helps to highlight Java problems

Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring's Radar Love shows off problems that can leave users at the mercy of Java attacks.

Righard Zwienenberg19 Aug 2013


Catch me if you can: Can we predict who will fall for phishing emails?

Catch me if you can: Can we predict who will fall for phishing emails?

Catch me if you can: Can we predict who will fall for phishing emails?

A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.

David Harley14 Aug 2013


Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

ESET Research30 Jul 2013


Digital Security

The Home Campaign: overstaying its welcome

The Home Campaign: overstaying its welcome

Digital Security

The Home Campaign: overstaying its welcome

The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.

Sébastien Duquette02 Jul 2013


ESET Research

More malware targeting crypto-currencies: Litecoin stealing Trojan found

More malware targeting crypto-currencies: Litecoin stealing Trojan found

ESET Research

More malware targeting crypto-currencies: Litecoin stealing Trojan found

Bitcoin is not the only crypto-currency targeted by malware now that a Trojan designed to steal Litecoins has been discovered. In this post we review recent discoveries in malware impacting digital money.

Robert Lipovsky01 Jul 2013


Malware

Needles and haystacks - the art of threat attribution

Needles and haystacks - the art of threat attribution

Malware

Needles and haystacks - the art of threat attribution

ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.

Aryeh Goretsky17 Jun 2013