Bad Rabbit: Not-Petya is back with improved ransomware

A new ransomware outbreak today and has hit some major infrastructure in Ukraine including Kiev metro. Here are some of the details about this new variant. Drive-by download via watering hole on popular sites One of the distribution method of Bad Rabbit is via drive-by download. Some popular websites are compromised and have JavaScript injected in … More Bad Rabbit: Not-Petya is back with improved ransomware

Fake cryptocurrency trading apps on Google Play

Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play disguised as legitimate Poloniex mobile apps. Apart from harvesting Poloniex login credentials, the fake apps also try to trick victims into making their Gmail accounts accessible to the attackers. Poloniex is one of the world’s leading cryptocurrency … More Fake cryptocurrency trading apps on Google Play

OSX/Proton spreading again through supply-chain attack

During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their application trojanized with the OSX/Proton malware on their official website. ESET contacted Eltima as soon as the situation was confirmed. Eltima was very responsive and maintained an excellent communication with us throughout the incident. Timeline … More OSX/Proton spreading again through supply-chain attack

ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms

ESET is extremely proud to announce that it is the Bronze Award Winner of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms (EPP). Awards for top customer-rated companies The Gartner Peer Insights Customer Choice Awards are well recognised across the industry and aim to identify the companies that customers like the … More ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms

Malware in firmware: how to exploit a false sense of security

When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types of dangerous malware that run inconspicuously might get less of our attention; as is the case with firmware malware or bootkits. Bootkits run before the OS … More Malware in firmware: how to exploit a false sense of security