ESET Research


2223 articles

Malware

Hesperbot – A New, Advanced Banking Trojan in the Wild

Hesperbot – A New, Advanced Banking Trojan in the Wild

Malware

Hesperbot – A New, Advanced Banking Trojan in the Wild

A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.

Robert Lipovsky04 Sep 2013


ESET Research

The Powerloader 64-bit update based on leaked exploits

The Powerloader 64-bit update based on leaked exploits

ESET Research

The Powerloader 64-bit update based on leaked exploits

A few months ago on this blog I described PowerLoader functionality - including an interesting way for privilege escalation into the explorer.exe system process. The leaked PowerLoader code is also used in other malware families.

Aleksandr Matrosov27 Aug 2013


ESET Research

Nymaim - obfuscation chronicles

Nymaim - obfuscation chronicles

ESET Research

Nymaim - obfuscation chronicles

We look at malware delivered by a campaign that has infected thousands of websites around the world - and the various control flow obfuscation techniques that make its analysis as interesting as it is challenging.

Jean-Ian Boutin26 Aug 2013


Malware

Orbital Decay: the dark side of a popular file downloading tool

Orbital Decay: the dark side of a popular file downloading tool

Malware

Orbital Decay: the dark side of a popular file downloading tool

Orbit Downloader by Innoshock is a popular browser add-on often used to download embedded videos from sites such as YouTube. But the popular add-on has disturbing hidden functions.

Aryeh Goretsky21 Aug 2013


ESET Research

Avatar rootkit: the continuing saga

Avatar rootkit: the continuing saga

ESET Research

Avatar rootkit: the continuing saga

In this blog post we confirm that the Avatar rootkit continues to thrive in the wild, and disclose some new information about its kernel-mode self-defense tricks. We continue our research into this malware family.

Aleksandr Matrosov and Anton Cherepanov21 Aug 2013


Radar Love: how classic rock helps to highlight Java problems

Radar Love: how classic rock helps to highlight Java problems

Radar Love: how classic rock helps to highlight Java problems

Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring's Radar Love shows off problems that can leave users at the mercy of Java attacks.

Righard Zwienenberg19 Aug 2013


Catch me if you can: Can we predict who will fall for phishing emails?

Catch me if you can: Can we predict who will fall for phishing emails?

Catch me if you can: Can we predict who will fall for phishing emails?

A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.

David Harley14 Aug 2013


Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

ESET Research30 Jul 2013


Digital Security

The Home Campaign: overstaying its welcome

The Home Campaign: overstaying its welcome

Digital Security

The Home Campaign: overstaying its welcome

The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.

Sébastien Duquette02 Jul 2013