White Papers
Turla LightNeuron: One email away from remote code execution
Turla LightNeuron: One email away from remote code execution
In this white paper, we present the analysis of LightNeuron, a backdoor specifically designed to target Microsoft Exchange mail servers. LightNeuron, which the cyberespionage group Turla is believed to have used since at least 2014, can spy on, modify or block any emails going through the compromised mail server, as well as execute commands sent by email.
Machine Learning era in cybersecurity: A step towards a safer world or the brink of chaos?
Machine Learning era in cybersecurity: A step towards a safer world or the brink of chaos?
While the idea of artificial intelligence (AI) and the real applications of machine learning (ML) have been influencing various fields for years now, their full transformative potential is yet to be realized. ML-based technologies increasingly help fight large-scale fraud, evaluate and optimize business processes, improve testing procedures and develop new solutions to existing problems. Like most innovations, however, even machine learning has drawbacks.
Android banking malware: Sophisticated Trojans vs. Fake banking apps
Android banking malware: Sophisticated Trojans vs. Fake banking apps
In this white paper, we will provide insight into the two most prevalent types of Android banking malware to date – sophisticated banking Trojans and fake banking apps – and compare their different approaches to achieving the same malicious goal. At the same time, we will explore the impact of those approaches on potential victims. Having identified the tactics of both categories, we will provide advice for users on how to stay safe from Android banking malware.
The Dark Side of the ForSSHe: A landscape of OpenSSH backdoors
The Dark Side of the ForSSHe: A landscape of OpenSSH backdoors
A little more than three years ago we started hunting for OpenSSH backdoors being used in-the-wild. While we are always trying to improve defenses against Linux malware by discovering and analyzing examples, the scope of this hunt was specifically to catch server-side OpenSSH backdoors. Unfortunately, telemetry on Linux malware is not as readily available as it is on other platforms. Nonetheless, malicious OpenSSH binaries are quite common and have features that help us detect them among legitimate OpenSSH binaries. While, as soon as we got them, we used the samples collected to improve our detection, we only began sorting and analyzing them in 2018. Surprisingly, we discovered many new backdoor families that had never been documented before.
GreyEnergy: A successor to BlackEnergy
GreyEnergy: A successor to BlackEnergy
ESET researchers have discovered and analyzed advanced malware, previously undocumented, that has been used in targeted attacks against critical infrastructure organizations in Central and Eastern Europe. The malware, named GreyEnergy by ESET researchers, exhibits many conceptual similarities with BlackEnergy, the malware used in attacks against the Ukrainian energy industry in December 2015
LOJAX: First UEFI rootkit found in the wild, courtesy of the Sednit group
LOJAX: First UEFI rootkit found in the wild, courtesy of the Sednit group
ESET researchers have discovered the first in-the-wild UEFI rootkit. Dubbed LoJax, the research team has shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe. The Sednit group is a resourceful APT group targeting people and organizations around the world. It has been in operation since at least 2004, using a wide range of malware families.
Can artificial intelligence power future malware?
Can artificial intelligence power future malware?
Artificial intelligence (AI) is almost an omnipresent topic these days. It is the centerpiece of sales pitches, it “powers” various online services and is mentioned in regard to almost any new product seeking investors.
Turla Outlook Backdoor: Analysis of an unusual Turla backdoor
Turla Outlook Backdoor: Analysis of an unusual Turla backdoor
Turla, also known as Snake, is an espionage group notorious for having breached some heavily-protected networks. They have been busy attacking diplomats and military targets around the world. Among the notable victims were the Finnish Foreign Ministry in 2013 , the Swiss military firm RUAG between 2014 and 2016 and more recently, the German government at the end of 2017/beginning of 2018.
Quasar, Sobaken and Vermin: A deeper look into an ongoing espionage campaign
Quasar, Sobaken and Vermin: A deeper look into an ongoing espionage campaign
Using remote access tools Quasar, Sobaken and Vermin, cybercriminals have been systematically spying on Ukrainian government institutions and exfiltrating data from their systems. The threat actors, first mentioned in a report from January 2018 and tracked by ESET since mid-2017, continue to develop new versions of their stealthy malware.