Nemucod is back and serving an ad-clicking backdoor instead of ransomware

Nemucod, the Trojan that affected Ireland worst in 2016 is back with a new campaign. Instead of serving its victims ransomware, it delivers an ad-clicking backdoor Trojan detected by ESET as Win32/Kovter. As a backdoor, this trojan allows the attacker to control the machine remotely without the victim’s consent or knowledge. The currently used variant … More Nemucod is back and serving an ad-clicking backdoor instead of ransomware

Fake Prisma apps found on Google Play

Before the release of the Android version of Prisma, a popular photo transformation app, fake Prisma apps flooded the Google Play Store. ESET researchers discovered fake Prisma apps of different types, including several dangerous trojan downloaders. The Google Play security team removed them from the official Android store at ESET’s notice. Prior to that point, … More Fake Prisma apps found on Google Play

New OSX/Keydnap malware is hungry for credentials

ESET analyses multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject into browsers display advertisements while the victim is browsing the web. For the last few weeks, we have been investigating an interesting case where the purpose of the malware is to steal the content of the keychain … More New OSX/Keydnap malware is hungry for credentials

ESET Ireland wins New Business Champion Award 2016

…but the real winner is the security conscious Irish IT and business, with their maturity when it comes to understanding the modern threatscape. All members of the global ESET family gather once per year for the World Partner Conference, where new products and releases are announced and discussed, experience in fighting cybercrime is shared and … More ESET Ireland wins New Business Champion Award 2016

Espionage toolkit targeting Central and Eastern Europe uncovered

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on … More Espionage toolkit targeting Central and Eastern Europe uncovered