(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2215 articles

Ukraine Crisis – Digital Security Resource Center

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

Ukraine Crisis – Digital Security Resource Center

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks

Anton Cherepanov and Robert Lipovsky17 Oct 2018


Ukraine Crisis – Digital Security Resource Center

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

Ukraine Crisis – Digital Security Resource Center

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven

Anton Cherepanov and Robert Lipovsky11 Oct 2018


ESET Research

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

ESET Research

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe

ESET Research27 Sep 2018


ESET Research

DanaBot shifts its targeting to Europe, adds new features

DanaBot shifts its targeting to Europe, adds new features

ESET Research

DanaBot shifts its targeting to Europe, adds new features

ESET researchers have discovered new DanaBot campaigns targeting a number of European countries

ESET Research21 Sep 2018


Scams

Fake finance apps on Google Play target users from around the world

Fake finance apps on Google Play target users from around the world

Scams

Fake finance apps on Google Play target users from around the world

Cybercrooks use bogus apps to phish six online banks and a cryptocurrency exchange

Lukas Stefanko19 Sep 2018


Kodi add-ons launch cryptomining campaign

Kodi add-ons launch cryptomining campaign

Kodi add-ons launch cryptomining campaign

ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi being used to distribute Linux and Windows cryptocurrency-mining malware

Kaspars Osis13 Sep 2018


ESET Research

PowerPool malware exploits ALPC LPE zero-day vulnerability

PowerPool malware exploits ALPC LPE zero-day vulnerability

ESET Research

PowerPool malware exploits ALPC LPE zero-day vulnerability

Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure

Matthieu Faou05 Sep 2018


ESET Research

Of ML and malware: What’s in store?

Of ML and malware: What’s in store?

ESET Research

Of ML and malware: What’s in store?

All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme

Tomáš Foltýn04 Sep 2018


ESET Research

Turla: In and out of its unique Outlook backdoor

Turla: In and out of its unique Outlook backdoor

ESET Research

Turla: In and out of its unique Outlook backdoor

ESET research offers a rare glimpse into the mechanics of a particularly stealthy and resilient backdoor that the Turla cyberespionage group can fully control via PDF files attached to emails

Tomáš Foltýn22 Aug 2018