ESET Research


2223 articles

Secure Coding

How to isolate VBS or JScript malware with Visual Studio

How to isolate VBS or JScript malware with Visual Studio

Secure Coding

How to isolate VBS or JScript malware with Visual Studio

ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.

Diego Perez11 Feb 2016


ESET Research

Windows exploitation in 2015

Windows exploitation in 2015

ESET Research

Windows exploitation in 2015

Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET's annual Windows exploitation in 2015 report.

ESET Research26 Jan 2016


Cybercrime

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

Cybercrime

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.

Anton Cherepanov03 Jan 2016


Nemucod malware spreads ransomware Teslacrypt around the world

Nemucod malware spreads ransomware Teslacrypt around the world

Nemucod malware spreads ransomware Teslacrypt around the world

ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.

Josep Albors16 Dec 2015


ESET Research

News from the Dorkside: Dorkbot botnet disrupted

News from the Dorkside: Dorkbot botnet disrupted

ESET Research

News from the Dorkside: Dorkbot botnet disrupted

Law enforcement agencies from around the globe, aided by Microsoft security researchers, today announced the disruption of one of the most widely distributed malware families – Win32/Dorkbot.

Jean-Ian Boutin03 Dec 2015


ESET Research

Operation Buhtrap malware distributed via ammyy.com

Operation Buhtrap malware distributed via ammyy.com

ESET Research

Operation Buhtrap malware distributed via ammyy.com

The free version of Ammyy's remote administrator software were being served a bundle that contained an NSIS installer used by the gang behind Operation Buhtrap.

Jean-Ian Boutin11 Nov 2015


ESET Research

Multi-stage exploit installing trojan

Multi-stage exploit installing trojan

ESET Research

Multi-stage exploit installing trojan

Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.

Marc-Etienne M.Léveillé20 Oct 2015


ESET Research

Brolux trojan targeting Japanese online bankers

Brolux trojan targeting Japanese online bankers

ESET Research

Brolux trojan targeting Japanese online bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.

Jean-Ian Boutin and Anton Cherepanov15 Oct 2015


Android AdDisplay using anti-bouncer technique

Android AdDisplay using anti-bouncer technique

Android AdDisplay using anti-bouncer technique

In order to help make Google Play a safer place for Android users, ESET continues to monitor the official Android app market for malicious or potentially unwanted applications.

Lukas Stefanko08 Oct 2015