Europe’s quest for energy independence and how cyber‑risks come into play

Soaring energy prices and increased geopolitical tensions bring a sharp focus on European energy security. It is generally understood that the world is deeply interconnected, especially when it comes to energy supplies and the global energy trade. Maintaining complex, but reliable business and nation-state relationships has been central to ensuring a smooth and sustained functioning … More Europe’s quest for energy independence and how cyber‑risks come into play

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques. ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities … More Under the hood of Wslink’s multilayered virtual machine

ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users

The attackers distributed malicious apps via fake and legitimate sites, and Telegram and Facebook groups. This sophisticated malicious cryptocurrency scheme targets mobile devices using Android or iOS operating systems (iPhones). The malicious apps were distributed through fake websites, mimicking legitimate wallet services and promoted with ads placed on legitimate sites using misleading articles, and via … More ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users

The SMB cybercrime sweet spot: Small and medium in both size and protection

Small and medium businesses (SMBs) have been sprouting up worldwide, owing to the fact that they are often innovative and can be established by pretty much anyone. From 2000 to 2020, there was an increase of over 50% in the number of SMBs worldwide. Although news outlets often focus on cyberthreats targeting nation states and large enterprises, it … More The SMB cybercrime sweet spot: Small and medium in both size and protection

ESET Research discovers Mustang Panda’s Hodur cyberespionage malware: Old tricks, new Korplug variant

Mustang Panda, the cyberespionage group behind this threat, is targeting mainly governmental entities and NGOs in East and Southeast Asia, and some in Europe and Africa. · This cyberespionage campaign dates back to at least August 2021 and is still ongoing as of March 2022. · Mustang Panda, the APT group behind this campaign, is … More ESET Research discovers Mustang Panda’s Hodur cyberespionage malware: Old tricks, new Korplug variant