You searched for ESET/ | SC Media

Your search for ESET/ returned 599 results

Your search for ESET/ returned 599 results

Sort Results:

Relevant Recent

Enlist the security community to safeguard our elections this fall

This election cycle we’re running a high-stakes presidential race in the U.S., so it’s hard to imagine a foreign nation-state that wouldn’t like to cast a ballot. Unfortunately, we’ve seen election interference before and federal agencies like the National Counterintelligence and Security Center have produced unclassified Election Threat Updates to inform the public of nation-state…
Coronavirus, Cybercrime, Mobile Security, Ransomware

Mobile ransomware disguised as upcoming Canadian Covid-19 contact tracing app

Capitalizing on a Canadian government announcement pertaining to the development of a nationwide, voluntary Covid-19 contact tracing app, malicious actors this month created a fake version of such an app that in reality infects Android users with mobile ransomware. According to a new blog post from ESET, the ransomware, dubbed CryCryptor, was found being distributed…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn

A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies in Europe and the Middle East late last year, researchers from ESET have reported. The highly targeted campaign — dubbed Operation In(ter)ception (an allusion to one malware sample’s file name) — took place from September…
APTs/cyberespionage, Malware, Security News

VBA macro, remote template injectors included in Gamaredon post-compromise tool kit

The Gamaredon threat group has built a post-compromise tool arsenal that includes remote template injectors for Word and Excel documents as well as a unique Outlook mass-mailing macro, researchers recently discovered. The tools, previously undocumented, boast a VBA macro aimed at Outlook that sends spearphishing emails to a victim’s Microsoft address book contacts, according to…
Malware, Security News

Turla’s ComRAT v4 uses Gmail web UI to receive commands, steal data

Researchers have uncovered a version of the ComRat backdoor, one of the Turla Group’s oldest malware families, that distinguishes itself by using Gmail’s web UI to receive commands and nick data. The new version of ComRAT, known for stealing sensitive documents and targeting various government entities and military organizations, was in use as late as…
APTs/cyberespionage, Gaming, Malware, Security News

Modular backdoor sneaked into video game developers’ servers

A suspected Chinese APT group used a newly discovered modular backdoor to infect at least one video game developer’s build orchestration server and at least one other company’s game servers, researchers have reported. Although these attacks appear to have taken place prior to March, such incidents are now more important than ever to detect and…
APTs/cyberespionage, Cybercrime, Malware, Security News

Ramsay spy framework built to subvert air-gapped defenses

Air-gapped networks aren’t easily compromised, but they don’t offer perfectly air-tight security either. Leveraging insider threats, infecting flash drives and other removable media, and conducting side-channel attacks are all techniques malicious actors can employ to spread malware to isolated systems. Indeed, researchers at ESET are reporting the discovery of a new cyber espionage framework designed…
Cybercrime, Data Breach, Security News, Website/Web Server Security

San Francisco airport websites hacked to swipe personal device credentials

Two websites affiliated with San Francisco International Airport (SFO) were compromised with code last March, allowing attackers to steal device login credentials from users who visited these sites, airport officials have disclosed. The breach affected the websites, which appears to deliver informational content to the SFO workforce, and, which includes details on airport…
Next post in Cybercrime