ESET research · @ESETresearch
1200 followers · 20 posts · Server infosec.exchange

analyze first in-the-wild UEFI bootkit bypassing UEFI Secure Boot even on fully updated Windows 11 systems. Its functionality indicates it is the UEFI bootkit, for sale on hacking forums since at least Oct 6, 2022. welivesecurity.com/2023/03/01/bla… 1/11

#ESETresearch #blacklotus

Last updated 2 years ago

Ján Trenčanský · @j91321
72 followers · 123 posts · Server infosec.exchange

Great research by my colleagues from on the UEFI bootkit. Definitely worth reading. welivesecurity.com/2023/03/01/

#ESETresearch #blacklotus

Last updated 2 years ago

Aryeh Goretsky · @goretsky
215 followers · 25 posts · Server infosec.exchange

This is kind of a free-form interview and discussion I conducted with my friend and colleague at ESET, Specialized Security Researcher Cameron Camp: welivesecurity.com/2023/02/07/

Now, if you are accustomed to Cameron and I presenting information in a certain fashion, how this looks and sounds is going to be quite a bit different than the types of research we have previously shared. What we were trying to do here was have a free-flowing discussion on the topic and, well, the result is both this report and the accompanying podcast.

Coming up with the formats for these was a bit an experiment for us, and I'm hoping we get some feedback on whether or not people like it and want us to have more discussions this way in the future.

#ESETresearch #report #podcast

Last updated 2 years ago

ESET research · @ESETresearch
1134 followers · 19 posts · Server infosec.exchange

China-aligned 🇨🇳 groups, specifically Goblin Panda, started duplicating Mustang Panda's interest in European countries. Iran-aligned 🇮🇷 groups continued to operate at a high volume. Full report ➡️ welivesecurity.com/wp-content/ 4/4

#ESETresearch

Last updated 2 years ago

ESET research · @ESETresearch
1134 followers · 16 posts · Server infosec.exchange

released its latest APT Activity Report, covering the period from September until the end of December 2022 (T3 2022). Take a look ➡ welivesecurity.com/wp-content/ 1/4

#ESETresearch

Last updated 2 years ago

Tim Hogan 浩勤 · @TimInHonolulu
2695 followers · 4079 posts · Server mstdn.social

RT @ESETresearch@twitter.com

On January 25th discovered a new cyberattack in 🇺🇦 Ukraine. Attackers deployed a new wiper we named using Active Directory Group Policy. The wiper is written in Go programing language. We attribute this attack to . 1/3

🐦🔗: twitter.com/ESETresearch/statu

#sandworm #swiftslicer #ESETresearch #Breaking

Last updated 2 years ago

ESET research · @ESETresearch
868 followers · 15 posts · Server infosec.exchange

releases IPyIDA 2.0, a plugin for IDA Pro that integrates IPython for a better console. Learn about all the new features on Hex-Rays’ blog at hex-rays.com/blog/plugin-focus or read the tl;dr down here 👇 @marcetienne 1/5

#ESETresearch

Last updated 2 years ago

ESET research · @ESETresearch
868 followers · 15 posts · Server infosec.exchange

On Nov 21st detected and alerted @_CERT_UA of a wave of ransomware we named , deployed in multiple organizations in Ukraine🇺🇦. While the malware written in .NET is new, its deployment is similar to previous attacks attributed to . 1/9

#ESETresearch #ransomboggs #sandworm

Last updated 2 years ago

Jean-Ian Boutin · @jiboutin
43 followers · 1 posts · Server infosec.exchange

Hey Mastodon! We recently published our APT threat report, looking back at the past few months of threat actor activities monitored by . Check it out welivesecurity.com/wp-content/

#ESETresearch

Last updated 2 years ago

· @redfrog
2984 followers · 57952 posts · Server mamot.fr

discovered that /#APT27 used a code-signing certificate belonging to VMPsoft, the developer of the VMProtect packer.
The signed file is a loader for the SysUpdate backdoor (aka Soldier).
We notified VMPSoft of this compromise 1/4
virustotal.com/gui/file/a8527a

#luckymouse #ESETresearch

Last updated 2 years ago

GRUzzly Bear :verified: · @1nternaut
239 followers · 107 posts · Server infosec.exchange

RT @ESETresearch@twitter.com

discovered that /#APT27 used a code-signing certificate belonging to VMPsoft, the developer of the VMProtect packer. The signed file is a loader for the SysUpdate backdoor (aka Soldier). We notified VMPSoft of this compromise 1/4
virustotal.com/gui/file/a8527a

#ESETresearch #luckymouse

Last updated 2 years ago

Jessica Beffa · @jessicabeffa
29 followers · 33 posts · Server infosec.exchange

Today @ESETresearch introduced their brand new APT Activity Report: an overview of the latest activities of selected APT groups analyzed by . T2 2022 saw no decline in APT activity, with aerospace and defense industries among the targets. Read more in the report: welivesecurity.com/wp-content/

#ESETresearch

Last updated 2 years ago

The detailed white paper is available here:
welivesecurity.com/wp-content/ …
As usual, the Indicators of Compromise and a @MISPProject event are available on our GitHub repository:
github.com/eset/malware-ioc/tr … 4/4

#ESETresearch

Last updated 5 years ago

CIRCL (Twitter feed) · @circl
117 followers · 607 posts · Server mastodon.opencloud.lu

- Banking trojan disguised as “Coronavirus Map” app targets Spanish users .
It claims to be on , but isn't.
If any related app requests Accessibility Services, we advise not to install, it’s most likely malicious. @LukasStefankopic.twitter.com/OLgxUCqadE

#COVID19 #googleplay #android #ESETresearch

Last updated 5 years ago

CIRCL (Twitter feed) · @circl
117 followers · 607 posts · Server mastodon.opencloud.lu

ALERT: : If you installed malicious Coronavirus Tracker app that locked your smartphone and requested ransom, use "4865083501" code to unlock it. Key is hardcoded. @LukasStefanko Details:
domaintools.com/resources/blog …pic.twitter.com/ojkRkGznPN

#ransomware #android #COVID19 #ESETresearch

Last updated 5 years ago