ESET Research


2223 articles

Malware

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

Malware

Boaxxe adware: 'A good ad sells the product without drawing attention to itself' – Pt 1

This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.

Joan Calvet14 Jan 2014


Malware

The Death of Anti-Virus: conference paper

The Death of Anti-Virus: conference paper

Malware

The Death of Anti-Virus: conference paper

David Harley19 Dec 2013


ESET Research

Qadars – a banking Trojan with the Netherlands in its sights

Qadars – a banking Trojan with the Netherlands in its sights

ESET Research

Qadars – a banking Trojan with the Netherlands in its sights

The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers - 75% of detections come from this region.

Jean-Ian Boutin18 Dec 2013


ESET Research

New Hesperbot targets: Germany and Australia

New Hesperbot targets: Germany and Australia

ESET Research

New Hesperbot targets: Germany and Australia

In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still active – November has been particularly eventful. In this post, we’ll give an update on the situation and malware developments.

Robert Lipovsky10 Dec 2013


Malware

Did you say "Advanced" Persistent Threats?

Did you say "Advanced" Persistent Threats?

Malware

Did you say "Advanced" Persistent Threats?

Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered. Here we analyze a targeted attack used in Taiwan and Vietnam - but is this 'APT' really that advanced?

Olivier Bilodeau06 Dec 2013


Malware

Chronology of a Skype attack

Chronology of a Skype attack

Malware

Chronology of a Skype attack

By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk - an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.

Pablo Ramos20 Nov 2013


Windows 8.1 - security improvements

Windows 8.1 - security improvements

Windows 8.1 - security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new ".1" point release of Windows 8.

Aryeh Goretsky17 Nov 2013


Malware

Five interesting facts about the Morris worm (for its 25th anniversary)

Five interesting facts about the Morris worm (for its 25th anniversary)

Malware

Five interesting facts about the Morris worm (for its 25th anniversary)

On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.

Sebastián Bortnik06 Nov 2013


Malware

Nymaim: Browsing for trouble

Nymaim: Browsing for trouble

Malware

Nymaim: Browsing for trouble

We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.

Jean-Ian Boutin23 Oct 2013