Cyberespionage the Gamaredon way

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics. When describing state-backed threat actors, one would probably expect a super sophisticated, stealthy group capable of avoiding all alarms and defenses with surgical precision. With Gamaredon, most of that goes out the … More Cyberespionage the Gamaredon way

Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business. What is the most common pain point facing businesses these days? Is it supply chain fragility? Fierce competition? Tight cashflows? Or is it the rising … More Beyond the checkbox: Demystifying cybersecurity compliance

Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Amazon confirmed that over 2.86 million of the more than 5 million records of employee data was exposed in a breach linked to the MOVEit vulnerability (CVE-2023-34362). According to The Register*, the breach affected a property management vendor, compromising work contact information such as email addresses, phone numbers, and building locations. Although many companies were … More Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Why botnet tracking is so effective

When cybersecurity vendors invest heavily into sophisticated malware replication mechanisms studying real-life malware behavior in isolated environments, one may ask what the point of malware tracking is. What do we learn by extracting data from malicious code without it running or communicating with a command and control (C&C) server? Using the Grandoreiro banking trojan as … More Why botnet tracking is so effective

Days after takedown, ESET Research releases analysis of RedLine Stealer infostealer empire

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules. Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into this infostealer’s undocumented backend modules, which assisted law enforcement in the takedown effort. The in-depth technical analysis … More Days after takedown, ESET Research releases analysis of RedLine Stealer infostealer empire