White Papers
Visiting the bear Den Presentation for REcon 2016
Visiting the bear Den Presentation for REcon 2016
A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy.
Operation Groundbait: Analysis of a surveillance toolkit
Operation Groundbait: Analysis of a surveillance toolkit
The Rise of Android Ransomware
The Rise of Android Ransomware
Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.
Operation Buhtrap Presentation for AVAR2015
Operation Buhtrap Presentation for AVAR2015
A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap.
Windows Exploitation in 2015
Windows Exploitation in 2015
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.
Windows 10: Should you go there?
Windows 10: Should you go there?
Is Anti-Virus dead?
Is Anti-Virus dead?
Is Anti-Virus dead?
Unpack Your Troubles: .NET packer tricks countermeasures
Unpack Your Troubles: .NET packer tricks countermeasures
Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.
Operation Potao Express: Analysis of a cyber-espionage toolkit
Operation Potao Express: Analysis of a cyber-espionage toolkit
Operation Potao Express: Analysis of a cyber-espionage toolkit