ESET Research


2256 articles

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes

ESET Research31 Jan 2024


ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology

ESET Research30 Jan 2024


NSPX30: A sophisticated AitM-enabled implant evolving since 2005

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood

Facundo Muñoz24 Jan 2024


ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces

ESET Research18 Dec 2023


OilRig’s persistent attacks using cloud service-powered downloaders

OilRig’s persistent attacks using cloud service-powered downloaders

OilRig’s persistent attacks using cloud service-powered downloaders

ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications

Zuzana Hromcová and Adam Burgher14 Dec 2023


A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository

Marc-Etienne M.Léveillé and Rene Holt12 Dec 2023


Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play

Lukas Stefanko05 Dec 2023


Telekopye: Chamber of Neanderthals’ secrets

Telekopye: Chamber of Neanderthals’ secrets

Telekopye: Chamber of Neanderthals’ secrets

Insight into groups operating Telekopye bots that scam people in online marketplaces

Radek Jizba23 Nov 2023