ESET Research


2283 articles

New Hesperbot targets: Germany and Australia

New Hesperbot targets: Germany and Australia

New Hesperbot targets: Germany and Australia

In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still active – November has been particularly eventful. In this post, we’ll give an update on the situation and malware developments.

Robert Lipovsky10 Dec 2013


Did you say "Advanced" Persistent Threats?

Did you say "Advanced" Persistent Threats?

Did you say "Advanced" Persistent Threats?

Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered. Here we analyze a targeted attack used in Taiwan and Vietnam - but is this 'APT' really that advanced?

Olivier Bilodeau06 Dec 2013


Chronology of a Skype attack

Chronology of a Skype attack

Chronology of a Skype attack

By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk - an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.

Pablo Ramos20 Nov 2013


Windows 8.1 - security improvements

Windows 8.1 - security improvements

Windows 8.1 - security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new ".1" point release of Windows 8.

Aryeh Goretsky17 Nov 2013


Five interesting facts about the Morris worm (for its 25th anniversary)

Five interesting facts about the Morris worm (for its 25th anniversary)

Five interesting facts about the Morris worm (for its 25th anniversary)

On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.

Sebastián Bortnik06 Nov 2013


Nymaim: Browsing for trouble

Nymaim: Browsing for trouble

Nymaim: Browsing for trouble

We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.

Jean-Ian Boutin23 Oct 2013


Is this how Indonesia topped the malicious traffic charts?

Is this how Indonesia topped the malicious traffic charts?

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Lysa Myers23 Oct 2013


Solutions to current antivirus challenges

Solutions to current antivirus challenges

Solutions to current antivirus challenges

The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?

Peter Stancik19 Oct 2013


A prompt to save the world: new security features against malware in AutoCAD

A prompt to save the world: new security features against malware in AutoCAD

A prompt to save the world: new security features against malware in AutoCAD

Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.

Sebastián Bortnik17 Oct 2013