Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools. Twitter is reeling from what is arguably the biggest security breach in its history after the accounts of a long list of high-profile figures – including Barack Obama, Joe Biden, Elon Musk, Bill Gates and Jeff Bezos … More High‑profile Twitter accounts hacked to promote Bitcoin scam
ESET researchers have recently discovered websites distributing trojanized cryptocurrency trading applications for Mac computers. These were legitimate apps wrapped with GMERA malware, whose operators used them to steal information, such as browser cookies, cryptocurrency wallets and screen captures. In this campaign, the legitimate Kattana trading application was rebranded – including setting up copycat websites – … More Trojanized Mac cryptocurrency app collects wallets and screenshots, ESET Research discovers
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context. The COVID-19 pandemic has reshaped the way we work and, in many cases, also the way we interact with our loved ones. While a number of governments contemplate using contact … More Mobile security threats amid COVID‑19 and beyond: A Q&A with Lukas Stefanko
ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to the threat actor group known as Gaza Hackers, or Molerats. Instrumental in the operation is an Android app, Welcome Chat, which serves as spyware while also delivering the promised chatting functionality. The malicious website promoting … More ESET discovers a chat app spying on users and leaking stolen data
Another in our occasional series demystifying Latin American banking trojans In this installment of our series, we introduce Grandoreiro, a Latin American banking trojan targeting Brazil, Mexico, Spain and Peru. As such, it shows unusual effort by its authors to evade detection and emulation, and progress towards a modular architecture. We have seen Grandoreiro being … More Grandoreiro: How engorged can an EXE get?