Espionage toolkit targeting Central and Eastern Europe uncovered

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on … More Espionage toolkit targeting Central and Eastern Europe uncovered

And how do you protect your webcam?

James Comey, who heads up the Federal Bureau of Investigation (FBI), recently made an interesting remark during his presentation about encryption and technology at a college in Ohio, US. He admitted that, in order to protect his privacy, he puts tape over his laptop’s camera. The FBI director’s revelation created a buzz among information security … More And how do you protect your webcam?

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. In fact, as ESET’s senior researcher David Harley has previously observed, it has “been a constant all through the life of internet security”. But what is it exactly? In its broadest sense, social engineering is … More 5 things you need to know about social engineering

Operation Potao Express: Analysis of a cyber-espionage toolkit

Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data We presented our initial findings based on research into the Win32/Potao malware family in June, in our CCCC 2015 presentation in Copenhagen. Today, we are releasing the full whitepaper on the Potao malware with additional findings, the cyberespionage campaigns where it was … More Operation Potao Express: Analysis of a cyber-espionage toolkit