ESET Research


2223 articles

ESET Research

Korplug military targeted attacks: Afghanistan & Tajikistan

Korplug military targeted attacks: Afghanistan & Tajikistan

ESET Research

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

Robert Lipovsky and Anton Cherepanov12 Nov 2014


Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits

Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits

Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits

Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that has also been added to Nuclear EK last week.

Sébastien Duquette31 Oct 2014


ESET Research

The Evolution of Webinject

The Evolution of Webinject

ESET Research

The Evolution of Webinject

Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

Jean-Ian Boutin23 Oct 2014


ESET Research

Operation Windigo: "Good job, ESET!" says malware author

Operation Windigo: "Good job, ESET!" says malware author

ESET Research

Operation Windigo: "Good job, ESET!" says malware author

Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

Olivier Bilodeau15 Oct 2014


Cybercrime

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

Cybercrime

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

Robert Lipovsky14 Oct 2014


ESET Research

Sednit espionage group now using custom exploit kit

Sednit espionage group now using custom exploit kit

ESET Research

Sednit espionage group now using custom exploit kit

For at least five years the Sednit group has been relentlessly attacking various institutions, most notably in Eastern Europe. The group used several advanced pieces of malware for these targeted attacks, in particular the one we named Win32/Sednit, also known as Sofacy.

ESET Research08 Oct 2014


Video

How to keep your child safe on YouTube

How to keep your child safe on YouTube

Video

How to keep your child safe on YouTube

YouTube is one of the most popular websites in the world, but can expose younger viewers to inappropriate content. By following these 5 precautionary measures you can keep your child safe from any content that may be unsuitable.

Editor02 Oct 2014


Video

Should I worry about my connected devices?

Should I worry about my connected devices?

Video

Should I worry about my connected devices?

There could be many benefits of having a connected household, but connecting your appliances to the internet could also put them at risk of being hacked. We provide some useful tips to make sure all of your connected devices are protected.

Editor02 Oct 2014


Bootkits, Windigo, and Virus Bulletin

Bootkits, Windigo, and Virus Bulletin

Bootkits, Windigo, and Virus Bulletin

ESET research on Operation Windigo received an award at Virus Bulletin 2014. Our research on bootkits was also well received, and is now available publicly.

David Harley30 Sep 2014