ESET Research


2223 articles

ESET Research

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

ESET Research

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software

Anton Cherepanov14 May 2019


ESET Research

Turla LightNeuron: An email too far

Turla LightNeuron: An email too far

ESET Research

Turla LightNeuron: An email too far

ESET research uncovers Microsoft Exchange malware remotely controlled via steganographic PDF and JPG email attachments

Matthieu Faou07 May 2019


Internet of Things

D-Link camera vulnerability allows attackers to tap into the video stream

D-Link camera vulnerability allows attackers to tap into the video stream

Internet of Things

D-Link camera vulnerability allows attackers to tap into the video stream

ESET researchers highlight a series of security holes in a device intended to make homes and offices more secure

Miloš Čermák and Milan Fránik02 May 2019


ESET Research

Buhtrap backdoor and Buran ransomware distributed via major advertising platform

Buhtrap backdoor and Buran ransomware distributed via major advertising platform

ESET Research

Buhtrap backdoor and Buran ransomware distributed via major advertising platform

Criminal activities against accountants on the rise – Buhtrap and RTM still active

ESET Research30 Apr 2019


ESET Research

OceanLotus: macOS malware update

OceanLotus: macOS malware update

ESET Research

OceanLotus: macOS malware update

Latest ESET research describes the inner workings of a recently found addition to OceanLotus’s toolset for targeting Mac users

Romain Dumont09 Apr 2019


ESET Research

Fake or Fake: Keeping up with OceanLotus decoys

Fake or Fake: Keeping up with OceanLotus decoys

ESET Research

Fake or Fake: Keeping up with OceanLotus decoys

ESET researchers detail the latest tricks and techniques OceanLotus uses to deliver its backdoor while staying under the radar

Romain Dumont20 Mar 2019


ESET Research

Gaming industry still in the scope of attackers in Asia

Gaming industry still in the scope of attackers in Asia

ESET Research

Gaming industry still in the scope of attackers in Asia

Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software

Marc-Etienne M.Léveillé11 Mar 2019


ESET Research

ML-era in cybersecurity: A step toward a safer world or the brink of chaos?

ML-era in cybersecurity: A step toward a safer world or the brink of chaos?

ESET Research

ML-era in cybersecurity: A step toward a safer world or the brink of chaos?

As the use of this technology grows so does the risk that attackers may hijack it

Juraj Jánošík22 Feb 2019


ESET Research

Navigating the murky waters of Android banking malware

Navigating the murky waters of Android banking malware

ESET Research

Navigating the murky waters of Android banking malware

An interview with ESET malware researcher Lukáš Štefanko about Android banking malware, the topic of his latest white paper

Lukas Stefanko15 Feb 2019