ESET Research

ESET Research



611 articles by ESET Research

ESET research

First exploitation of Internet Explorer 'Unicorn bug' in-the-wild

First exploitation of Internet Explorer 'Unicorn bug' in-the-wild

ESET research

First exploitation of Internet Explorer 'Unicorn bug' in-the-wild

Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is significant because it exploits an old bug present in Internet Explorer versions 3 through 11.

ESET Research20 Nov 20143 min. read


ESET Research

G20 2014 Summit Lure used to target Tibetan activists

G20 2014 Summit Lure used to target Tibetan activists

ESET Research

G20 2014 Summit Lure used to target Tibetan activists

APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.

ESET Research14 Nov 20142 min. read


ESET Research

Sednit espionage group now using custom exploit kit

Sednit espionage group now using custom exploit kit

ESET Research

Sednit espionage group now using custom exploit kit

For at least five years the Sednit group has been relentlessly attacking various institutions, most notably in Eastern Europe. The group used several advanced pieces of malware for these targeted attacks, in particular the one we named Win32/Sednit, also known as Sofacy.

ESET Research08 Oct 20145 min. read


How To

Gamescom 2014: World of Malware?

Gamescom 2014: World of Malware?

How To

Gamescom 2014: World of Malware?

The gaming industry keeps growing, and the crowds at Cologne's Gamescom 2014, show why big game titles are rapidly becoming a target for cybercrime. Our tips will help you enjoy the latest games - without hackers declaring 'Game Over'.

ESET Research15 Aug 20144 min. read


ESET research

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

ESET research

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

Win32/Aibatook targets Japanese bank customers with an unusual Internet Explorer monitoring technique. We believe the malware has been in development for months - and is now ready for take-off.

ESET Research16 Jul 201411 min. read


ESET Research

Miniduke still duking it out

Miniduke still duking it out

ESET Research

Miniduke still duking it out

At the end of April Microsoft announced that a vulnerability in Word was actively being exploited. New variants of MiniDuke display interesting and novel features. Here, we take a closer look.

ESET Research20 May 20149 min. read


ESET research

Windows exploitation in 2013

Windows exploitation in 2013

ESET research

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

ESET Research11 Feb 20146 min. read


ESET research

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Versatile and infectious: Win64/Expiro is a cross-platform file infector

ESET research

Versatile and infectious: Win64/Expiro is a cross-platform file infector

ESET Research30 Jul 20137 min. read


ESET research

Anonymous and the Megaupload Aftermath: Hacktivism or Just Plain Ugly?

Anonymous and the Megaupload Aftermath: Hacktivism or Just Plain Ugly?

ESET research

Anonymous and the Megaupload Aftermath: Hacktivism or Just Plain Ugly?

ESET Research20 Jan 20123 min. read