A deep dive down the Vermin RAThole

ESET researchers have analysed remote access tools cybercriminals have been using in an ongoing campaign to systematically exfiltrate data from Ukrainian systems. In this blogpost, we will sum up the findings published in full in our white paper “Quasar, Sobaken and Vermin: A deeper look into an ongoing espionage campaign”. The attackers behind the campaign … More A deep dive down the Vermin RAThole

New FinFisher surveillance campaigns: Are internet providers involved?

New surveillance campaigns utilising FinFisher, infamous spyware known also as FinSpy and sold to governments and their agencies worldwide, are in the wild. Besides featuring technical improvements, some of these variants have been using a cunning, previously-unseen infection vector with strong indicators of major internet service provider (ISP) involvement. FinFisher has extensive spying capabilities, such as … More New FinFisher surveillance campaigns: Are internet providers involved?

USBee: how to spy on an isolated system with a USB

In recent years we’ve seen increasing numbers of attacks designed to affect systems which are isolated from the network and cannot be attacked using conventional methods. Almost all research into this has been carried out by experts in Israel – that comes as no great surprise since this is a country at the forefront of cybersecurity. … More USBee: how to spy on an isolated system with a USB

Snowden: 4 big security and privacy assumptions he undermined

Oliver Stone’s movie about Edward Snowden, which opens on Friday, September 16th, 2016, has a lot of people looking back at one of the biggest information security breaches in US history, the one we learned about in June, 2013. That’s when the UK-based Guardian newspaper published classified information about the mass electronic surveillance activities of … More Snowden: 4 big security and privacy assumptions he undermined