I was a young mathematics professor at Massachusetts Institute of Technology (MIT) when I read Richard Dawkins’ description of memes. I recall thinking: “Oh, that’s how it all works”. Memes are a generalization of genes, and, among other things, they include your beliefs. After studying memes for many decades, I have come to think that they are … More Memes: the explanation of nearly everything – including computer viruses
The Identity Theft Resource Center – @ITRCSD – invited researchers from ESET North America to take part in a Twitter chat, a holiday edition of their #IDTheftChat. The conversation related to scams targeting businesses and consumers, which always seem to increase dramatically at this time of year. The chat took place on December 7th 2017, and you can read … More Happy holidays, scam spotters!
Law enforcement authorities across the globe disrupted many long-running botnets powered by a malware family dubbed as Gamarue, mostly detected by ESET as Win32/TrojanDownloader.Wauchos and also known as Andromeda, capping a year-plus concerted effort that relied on technical intelligence from Microsoft and ESET researchers. ESET, having been approached by Microsoft to join the disruption effort, provided a technical analysis … More ESET helps law enforcement worldwide to disrupt Gamarue botnet
“Something magical happens when reverse engineers write Volatility plugins” – The Volatility Plugin Contest committee on Browserhooks ESET malware researchers Peter Kálnai and Michal Poslušný were awarded 3rd place in this year’s Volatility Plugin Contest for their Browserhooks tool. The duo made use of the knowledge they have gained tracking banking Trojans and Man-in-the-Browser (MitB) malware, and documenting … More ESET malware researchers awarded prize in open-source memory forensics competition
Cybercrime and other forms of “cyber-badness” affect different professions in different ways. Recently I participated in a panel about the cybersecurity concerns of journalists and the news media, hosted by the Inter America Press Association (IAPA). An account of the panel was published on WeLiveSecuritylast month but in this article I want to pass along some of the … More Cybersecurity for journalists and the news media
This year we have seen many different malware campaigns trying to compromise users with malicious apps distributed via Google Play. Even though these apps are often removed within days after having been reported to Google, they still manage to infect thousands of users. All apps submitted to Google Play are automatically analyzed in an effort … More New campaigns spread banking malware through Google Play
Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. We have discovered eight apps of this malware family on Google Play and notified Google’s security … More Multi-stage malware sneaks into Google Play