(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

ESET Research

Porn clicker trojans at Google Play: An analysis

Porn clicker trojans at Google Play: An analysis

ESET Research

Porn clicker trojans at Google Play: An analysis

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Lukas Stefanko24 Feb 2016


The rise of Android ransomware

The rise of Android ransomware

The rise of Android ransomware

Lock-screen types and file-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. ESET has prepared a topical white paper on the growth of this insidious Android malware.

Robert Lipovsky and Lukas Stefanko18 Feb 2016


Secure Coding

How to isolate VBS or JScript malware with Visual Studio

How to isolate VBS or JScript malware with Visual Studio

Secure Coding

How to isolate VBS or JScript malware with Visual Studio

ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.

Diego Perez11 Feb 2016


ESET Research

Windows exploitation in 2015

Windows exploitation in 2015

ESET Research

Windows exploitation in 2015

Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET's annual Windows exploitation in 2015 report.

ESET Research26 Jan 2016


Cybercrime

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

Cybercrime

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.

Anton Cherepanov03 Jan 2016


Nemucod malware spreads ransomware Teslacrypt around the world

Nemucod malware spreads ransomware Teslacrypt around the world

Nemucod malware spreads ransomware Teslacrypt around the world

ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.

Josep Albors16 Dec 2015


ESET Research

News from the Dorkside: Dorkbot botnet disrupted

News from the Dorkside: Dorkbot botnet disrupted

ESET Research

News from the Dorkside: Dorkbot botnet disrupted

Law enforcement agencies from around the globe, aided by Microsoft security researchers, today announced the disruption of one of the most widely distributed malware families – Win32/Dorkbot.

Jean-Ian Boutin03 Dec 2015


ESET Research

Operation Buhtrap malware distributed via ammyy.com

Operation Buhtrap malware distributed via ammyy.com

ESET Research

Operation Buhtrap malware distributed via ammyy.com

The free version of Ammyy's remote administrator software were being served a bundle that contained an NSIS installer used by the gang behind Operation Buhtrap.

Jean-Ian Boutin11 Nov 2015


ESET Research

Multi-stage exploit installing trojan

Multi-stage exploit installing trojan

ESET Research

Multi-stage exploit installing trojan

Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.

Marc-Etienne M.Léveillé20 Oct 2015