ESET Research


2223 articles

ESET Research

Learn how a research lab works

Learn how a research lab works

ESET Research

Learn how a research lab works

The story of viruses took place in a university laboratory and, keeping in mind the parallelism, we want to show you what is a malware research laboratory like and what exactly happens there.

Santiago Sassone02 Nov 2017


ESET Research

Windigo Still not Windigone: An Ebury Update

Windigo Still not Windigone: An Ebury Update

ESET Research

Windigo Still not Windigone: An Ebury Update

In 2014, ESET researchers wrote a blog post about an OpenSSH backdoor and credential stealer called Linux/Ebury In 2017, the team found a new Ebury sample.

Frédéric Vachon30 Oct 2017


Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

Bad Rabbit: Not-Petya is back with improved ransomware

Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

A new ransomware outbreak today has hit some major infrastructure in Ukraine including Kiev metro. Here are some details about this new variant of Petya.

Marc-Etienne M.Léveillé24 Oct 2017


ESET Research

Fake cryptocurrency trading apps on Google Play

Fake cryptocurrency trading apps on Google Play

ESET Research

Fake cryptocurrency trading apps on Google Play

With all the hype around cryptocurrencies, cybercriminals are trying to grab whatever new opportunity they can – be it hijacking users’ computing power to mine cryptocurrencies via browsers or by compromising unpatched machines, or various scam schemes utilizing phishing websites and fake apps.

Lukas Stefanko23 Oct 2017


ESET Research

OSX/Proton spreading again through supply-chain attack

OSX/Proton spreading again through supply-chain attack

ESET Research

OSX/Proton spreading again through supply-chain attack

Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.

ESET Research20 Oct 2017


ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker: Innovative Android Ransomware

ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.

ESET Research13 Oct 2017


ESET Research

Money-making machine: Monero-mining malware

Money-making machine: Monero-mining malware

ESET Research

Money-making machine: Monero-mining malware

While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.

Peter Kálnai and Michal Poslušný28 Sep 2017


ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

BankBot trojan returns to Google Play with new tricks

ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

The Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again and contains new tricks designed to get access to the private banking information of the user.

Lukas Stefanko25 Sep 2017


ESET Research

New FinFisher surveillance campaigns: Internet providers involved?

New FinFisher surveillance campaigns: Internet providers involved?

ESET Research

New FinFisher surveillance campaigns: Internet providers involved?

FinFisher has extensive spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are the controversies around its deployments.

Filip Kafka21 Sep 2017