White Papers

90 reports

Visiting the bear Den Presentation for REcon 2016

Visiting the bear Den Presentation for REcon 2016

A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy.


Operation Groundbait: Analysis of a surveillance toolkit

Operation Groundbait: Analysis of a surveillance toolkit

Operation Groundbait (Russian: Прикормка, Prikormka) is an ongoing cyber-surveillance operation targeting individuals in Ukraine. The group behind this operation has been launching targeted and possibly politically-motivated attacks to spy on individuals.
This paper presents ESET’s findings about Operation Groundbait based on our re- search into the Prikormka malware family.


The Rise of Android Ransomware

The Rise of Android Ransomware

Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.


Operation Buhtrap Presentation for AVAR2015

Operation Buhtrap Presentation for AVAR2015

A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap.


Windows Exploitation in 2015

Windows Exploitation in 2015

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.


Windows 10: Should you go there?

Windows 10: Should you go there?

Windows 10: Should you go there?


Is Anti-Virus dead?

Is Anti-Virus dead?

Is Anti-Virus dead?


Unpack Your Troubles: .NET packer tricks countermeasures

Unpack Your Troubles: .NET packer tricks countermeasures

Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.


Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit